Managing Security Is More Realistic Than Solving It, Says ARM’s Chief Executive

Last year, ARM infused its hardware security technology called TrustZone into fraction-of-a-millimeter-sized chips to be used in connected bandages or package trackers. But on Tuesday, the chief executive of the chip designer underscored another vital form of security. Read why Simon Segars of ARM says that managing security is more practical than trying to solve it on […]

Expert Insights on Developing a Physical Security Program

In today’s digital age, security tends to be thought about in terms of firewalls, malware, encryption and other safeguards for electronic systems. But the security of those systems, as well as an organization’s facilities, people and other critical assets depends significantly on physical security as well. Read what Scott Soltis of HMS Security & Risk […]

Cyber Security 2017: tackling cyber-threats together

“Everybody is faced with a leap of faith in terms of keeping assets secure against cyber-attacks. Slowly people are realising that they need to put their data on to someone else’s infrastructure. That is a big evolution now, and there is a huge amount of trust and reputation at stake. Read the expert opinion from […]

Don’t Forget Basic Security Measures, Experts Say

New technologies like machine learning, artificial intelligence, and IoT will drive the scale and complexity of cyberattacks. Businesses have every reason to be concerned as the threat landscape continues to grow. But does it make sense to stress over advanced threats when organizations can’t defend against the attacks they currently face? Read why cyber security experts […]

Panel urges quick, decisive action on cybersecurity

Healthcare cybersecurity is a key public health concern that needs immediate and aggressive attention to counter the growing threats that are putting patient information at risk, according to the findings of a just-released task force report mandated by Congress. Read the expert opinion of the task force set up by  Department of Health and Human […]

Cybersecurity expert: Protect your company from internal threats

Robert Shields spent 20 years in the FBI hunting cybercriminals and cyberterrorists. When he started, criminals were snatching data off diskettes. Then crime went virtual. The job was intense. He loved it. He rose through the ranks and retired as special agent in charge. Read why Robert Shields says that it is important for companies to […]

Caught in the breach – what to do first

Security experts have been saying for more than a decade that it is “not if, but when” an organization will be hacked. So, the more relevant question, posed in the title of a panel discussion at Wednesday’s MIT Sloan CIO Symposium is: “You Were Hacked: Now What?” Read what the panel of experts at MIT Sloan CIO […]

Security Professionals React to Cybersecurity Executive Order

President Trump finally signed an executive order (EO) on cybersecurity. It appears to be receiving mostly positive reviews from security professionals but there is plenty of room to grow. According to Reuters, the EO on cybersecurity: seeks to improve the often-maligned network security of U.S. government agencies, from which foreign governments and other hackers have pilfered millions […]

Punitive penalties will drive GDPR compliance says analyst/CISO forum

At the IT Security Analyst and CISO Forum Debates hosted by Eskenzi a range of distinguished panellists grappled with a range of issues facing the industry, from GDPR to data breaches, reputation, hiring and the IOT. Read about the  IT Security Analyst and CISO Forum Debate in which security experts said that punitive penalties could […]

Don’t Forget Basic Security Measures, Experts Say

New technologies like machine learning, artificial intelligence, and IoT will drive the scale and complexity of cyberattacks. Businesses have every reason to be concerned as the threat landscape continues to grow. But does it make sense to stress over advanced threats when organizations can’t defend against the attacks they currently face? Read why cyber security experts […]