Security companies shouldn’t be this thin-skinned

FireEye, like all companies, wants to protect its intellectual property. But it needs to realize that security companies aren’t perceived like other companies.

The perils of single sign-on

SSO will bring several benefits, but our manager has to be prepared to address any security lapses that could accompany it.

Kaspersky: Great product, dreadful installation/upgrade process

All companies need to pay more attention to the experience that ordinary users have when they try to install new products and upgrades.

We can still ‘Nail’ security in the IoT

It’s a matter of getting product developers to overcome their naïveté, ignorance and laziness. Harsh? Yeah, but the truth hurts.

The sharks of the Internet

That’s what hackers are — they should be feared, but our fears are completely out of proportion.

The RMS Titanic and cybersecurity

Famous shipwreck holds many lessons for the cybersecurity community

By Jon Oltsik | 02 September, 2015 18:20

Tags: RMS Titanic, cybersecurity, security

Of Black Hat and security awareness

The annual security conference was a chance to go deep. But back in the office, how do you get 100% of the company’s employees to complete the security awareness training?

Adobe Flash: Kill it now

It’s time to put Flash out of our misery once and for all. And, thanks to Google, it may finally happen.

Advanced pedestrian detection is here. It is very useful and makes me nervous

Google has made a big leap forward with real-time image recognition that can be applied to pedestrian detection. This is good news for potential accident victims out there. But the privacy implications!

By Erika Morphy | 28 August, 2015 21:00

Tags: surveillance

Why we love last-millennium password policies

IT pilot fish goes to work at a large retailer's distribution center, where the policy is that passwords must be changed every 90 days -- which turns out to have unexpected consequences.

Oracle, still clueless about security

Oracle Chief Security Officer Mary Ann Davidson let loose a long rant about people who dare to look into the security of the company’s products. Oracle quickly backed away from those remarks, but has it faced up to the fact that its CSO has some wrongheaded notions about her own area of expertise?

By Steven J. Vaughan-Nichols | 25 August, 2015 19:49

Tags: Oracle

The security and risk management of shadow IT

Shadow IT brings many security issues, but since these systems are not on IT's radar, they do not get factored into overall risk management strategy. Here are some practical suggestions.

By Robert C. Covington | 24 August, 2015 20:00

Tags: security

Facebook’s Threat Intelligence Sharing Potential

Data management, scale, and algorithmic strengths may give Facebook an advantage in the threat intelligence platform sharing platforms market

Wi-Fi at DEF CON - dealing with the worlds most dangerous network

Wi-Fi can be done securely, even at a hacker conference like DEF CON. Just avoid open networks and Android.

By Michael Horowitz | 24 August, 2015 02:30

Tags: Android, Chromebooks

Milling with the hackers at Black Hat and Def Con

Attending both for the first time was a chance to compare and contrast.

Why every business needs a WISP

Non-compliance is a risk, and the Attorney General's office carries a big stick for those who don't follow the rules.

Forgot your password? Good luck, chum

This retired pilot fish notices that nothing has shown up in his email in-box in almost 12 hours, which almost never happens. And when he tries his broadband provider's web mail access, he's got another problem.

Selling IT on getting the most out of a new firewall

We bought a next-generation firewall, as I had hoped we would. The real trick, though, was getting the IT department to take full advantage of all of its advanced functionality.

By By Mathias Thurman | 18 August, 2015 02:33

Tags: palo alto networks, security

A serious take on silly-sounding cybersecurity terms

Critical data breaches and hacking incidents have entered the mainstream consciousness. In one way this is good, as people are becoming more aware of the types of things that can happen and taking a closer look at how they use technology.

By By Rhonda Chicone | 18 August, 2015 02:21

Tags: security

Selling IT on getting the most out of a new firewall

The IT department was reluctant to take full advantage of the advanced functionality. So our manager annoyed them into compliance.

Top Whitepapers

Featured Whitepapers