Dangers Of Shopping Are Evolving
Quick Hits | 11/26/2014 | Point-of-sale malware is making brick-and-mortar shopping more dangerous. Online, attackers are beginning to value user accounts with payment information attached more than credit card details themselves.
10 Ways Security Gurus Give Thanks
From board-level awareness to bug bounty programs and everything in between, the security world's maturation offers security practitioners something to be thankful for.
Cyber Security Needs Its Ralph Nader
Commentary | 11/24/2014 | It took thousands of unnecessary traffic fatalities to create an environment for radical transformation of the auto industry. What will it take for a similar change to occur in data security?
Enter The Digital Risk Officer
Commentary | 11/20/2014 | In the brave new world of digital risk management, a CISO would report up to a DRO who manages risk from a business perspective and works with peers in business ops, compliance, and IT security.
Deconstructing The Cyber Kill Chain
Commentary | 11/18/2014 | As sexy as it is, the Cyber Kill Chain model can actually be detrimental to network security because it reinforces old-school, perimeter-focused, malware-prevention thinking.
The Year Of The Retailer Data Breach
Slideshows | 11/17/2014 | This year's wave of attacks was more dramatic in its widespread scope and seemingly constant battering of more than a dozen big box chains.
Why Cyber Security Starts At Home
Commentary | 11/17/2014 | Even the grandmas on Facebook need to know and practice basic security hygiene, because what happens anywhere on the Internet can eventually affect us all.
Time To Turn The Tables On Attackers
Commentary | 11/13/2014 | As a security industry, we need to arm business with innovative technologies that provide visibility, analysis, and action to prevent inevitable breaches from causing irreparable damage.
Retail Hacking: What To Expect This Holiday Season
Commentary | 11/13/2014 | Find out what retailers are doing (and not doing) to keep customers and transactions safe on Dark Reading Radio with guests with Nick Pelletier of Mandiant, and Arthur Tisi, CIO, Natural Markets Food Group.
What We Mean by Maturity Models for Security
Partner Perspectives | 11/12/2014 | The aim is to assess the current state of security against a backdrop of maturity and capability to translate actions into goals that even non-security people can grasp.
‘Walk & Stalk’: A New Twist In Cyberstalking
Commentary | 11/11/2014 | How hackers can turn Wifi signals from smartphones and tablets into a homing beacon that captures users' online credentials and follows them, undetected, throughout the course of the day.
|