The Security Blog is curated by our team of editors and includes thought provoking opinions, trends, and essential security information for security executives.
In August 2013, Former Assistant Defense Secretary for Homeland Defense & Americas’ Security Affairs, Dr. Paul Stockton sat on a panel that discussed cybersecurity challenges facing the electric sector and some of the vulnerabilities in the U.S. electric grid system.
Today, as we remember the terrible events of the morning of September 11, 2001, the staff of Security magazine is considering how far we have come, and how far we have left to go.
As the industry continues to grow, there is an increased need for sophisticated recruiting, screening and hiring processes, as well as a strict commitment to hiring quality personnel who are the right fit for the position.
"Heartbleed" is a catchy name for a cyber vulnerability, but how exactly does it work, and how can you (and your enterprise's employees) be better protected against it?
Ultra High-Definition TV is the new frontier for consumers, but what about enterprise security executives? What should you be asking about this new video surveillance medium, and how could it impact your business?
BYOD has brought sweeping changes to the enterprise over the last several years. Nowhere is this more apparent than sitting at the head of IT Security in the role of CISO. Having served in this role at companies like Disney, TiVo and Salesforce during this pivotal time, I can say that it’s an interesting seat to have.
Security Needs to Better Protect Automated Telephone Systems
December 27, 2013
With break ins of enterprise computer networks grabbing the headlines, there is a chance that chief security officers at some corporations and government agencies could be neglecting the lowly office phone. And that may be a costly mistake.
Payment card information stolen from a recent breach at Target stores has already begun appearing for sale on underweb marketplaces for between $20 and $100 per card.