How do we provide mobile applications to our users that fulfill their need for immediate access, but also provide them with assurance that their information is safe? Here are four fundamentals.
Cloud-based botnets and mobile malware are two of 2013's top cyberthreats. What other threats make the list? Georgia Tech's Paul Royal tells how security pros and organizations can prepare.
Despite numerous data breaches, as well as financial incentives and penalties, many healthcare organizations aren't taking risk assessment requirements seriously. Experts offer insights on best practices.
Does your job involve mobile security? NIST has issued draft guidance defining the fundamentals needed to help mitigate the risks involved in using the latest generation of mobile devices.
With the release of the iPhone 5, and other new mobile devices and upgrades on the way, how should security leaders prepare their organizations for 2013? Intel CISO Malcolm Harkins offers guidance.
The failure to take appropriate steps to secure their IT assets leaves small and midsize enterprises vulnerable to attacks from cybercriminals seeking to pick low-hanging fruit.
What is the focus of new guidelines from the PCI Security Standards Council on mobile payment acceptance security? The council's Bob Russo and Troy Leach discuss key objectives - and what's coming next.
As mobile computing grows, security pros must prepare to face a new threat landscape that includes rogue marketplaces, insecure public Wi-Fi and proximity-based hacking, says Dan Hubbard, lead contributor the Cloud Security Alliance's new report, Top Threats to Mobile Computing.
The iPhone 5 is coming, and so are a slew of new or upgraded smart phones and tablets. How should security leaders prepare for this new wave of mobility? Malcolm Harkins, CISO of Intel, offers advice.
The information security threat landscape has evolved considerably over the past six years, and it's time that organizations' defenses evolve to match them, says Tom Kellermann of Trend Micro.
William Henley of the FDIC has just returned to banking regulation after a two-year stint working in the private sector. How did his business experience influence his approach to enforcing compliance?
Mike Mitchell, who serves as chairman of the PCI Security Standards Council, says mobile is a focus for leaders in the payment security space. So does the PCI Council expect emerging tech to influence the PCI-DSS?
Cloud computing and mobile technologies add new complexities to how we approach identity and access management. RSA CTO Sam Curry offers advice on overcoming the challenges.
Her first nine months on the job included a data breach and a CEO shakeup. Hear how Symantec CISO Patricia Titus has adapted to business change and re-focused the company's security team.
Intuit and GE veteran Steve Bennett, chairman of the IT security software provider, replaces Enrique Salem, the longtime Symantec executive who had served as the company chief executive officer since April 2009.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.