The Security Blog is written by our team of editors and includes thought provoking opinions, trends, and essential security information for security executives.
"Heartbleed" is a catchy name for a cyber vulnerability, but how exactly does it work, and how can you (and your enterprise's employees) be better protected against it?
Ultra High-Definition TV is the new frontier for consumers, but what about enterprise security executives? What should you be asking about this new video surveillance medium, and how could it impact your business?
BYOD has brought sweeping changes to the enterprise over the last several years. Nowhere is this more apparent than sitting at the head of IT Security in the role of CISO. Having served in this role at companies like Disney, TiVo and Salesforce during this pivotal time, I can say that it’s an interesting seat to have.
Security Needs to Better Protect Automated Telephone Systems
December 27, 2013
With break ins of enterprise computer networks grabbing the headlines, there is a chance that chief security officers at some corporations and government agencies could be neglecting the lowly office phone. And that may be a costly mistake.
Payment card information stolen from a recent breach at Target stores has already begun appearing for sale on underweb marketplaces for between $20 and $100 per card.
In a special report to the Security magazine Blog, IBM has unveiled the eighth annual IBM 5 in 5, a list of innovations that have the potential to change the way people work, live and interact during the next five years.
America has a severe but hidden arson problem because the reporting system for deliberately set building fires is so chaotic and patchwork that most arsons are not reported to the federal government.