BlackBerry CSO: Security will continue to be a ‘cat-and-mouse’ game

Security, they say, is the weakest link but as clichéd as that sounds, this adage is in fact truer in today’s world than before. And for one expert, the day that cyber-security catches up with cyber-crimes and threats isn’t going to come. Read why Alex Manea of BlackBerry Ltd says that cyber security will continue […]

Xerox CISO: How business should prepare for future security threats

The pace of change for the security threat landscape is accelerating. To cope with the change and ensure success against adversaries, Xerox Chief Information Security Officer (CISO) Dr. Alissa Johnson believes the security community needs to rethink the way it anticipates and responds to threats. Read the interview with Dr. Alissa Johnson, CISO at Xerox who […]

Businesses and GDPR: What they need to do to be compliant?

Enforcement of General Data Protection Regulation (GPDR) is now just few months away. The media have intensively examined and written about this topic from practically every angle since it became legislation. Businesses continue to struggle with both understanding and implementation of what they need to do to be compliant. Read ESET’s Tony Anscombe’s interview about how […]

Fighting cybersecurity threats through User Behaviour Analytics and Defense in Depth approach

OpenGov speaks to David Barton, Chief Information Security Officer at Forcepoint LLC. Mr. Barton has over 20 years of experience in security leadership roles across a variety of industries including telecommunications, healthcare, software development, finance, and government. Read the interview with David Barton of Forcepoint LLC who explains how businesses can fight cyber threats through User behaviour […]

Companies Need to ‘Think Twice’ Before Retaliating Against Hackers

Earlier this month, two members of the House of Representatives Tom Graves (R-GA) and Kyrsten Sinema (D-AZ) introduced a bill called Active Cyber Defense Certainty Act, dubbed the “hack back” bill, which would allow companies to hack the hackers who infiltrate their computer networks to retrieve or delete stolen data and find the culprits’ true […]

CSO Interview: Must-have Skills for New-age Cyber Security Professionals

While the market is getting overwhelmed and proliferated with new age disruptive technologies like IoT, AI and Blockchain, the complexity of cyber-attacks has also increased, says Vimal Mani, CISO, Bank of Sharjah . Read Vimal Mani of Bank of Sharjah lists must-have skills for new cyber security professionals on Gizmodo.

Secure Solutions for the Internet of Things

As a firm comprised of veterans from Apple, Google, Amazon Lab126 and other tech industry giants, Afero is well-poised as a developer of encryption and authentication technologies designed for Internet of Things security. We told you recently about their Modulo-2 development kit. Read the interview with Joe Britt of Afero who gives some secure solutions for […]

The Bottom Line: Cyber Security And The ‘Internet Of Things’

This week Dave and Mark discuss cybersecurity at work and at home. They speak with Francesca Spidalieri, a Senior Fellow for Cyber Leadership at the Pell Center at Salve Regina University in Newport. She’s also a member of the Governor’s Cyber Security Commission. Read why Francesca Spidalieri, a Senior Fellow for Cyber Leadership at the […]

The Equifax Breach: Former White House CIO Believes Marketers Need To Be Engaged In Cybersecurity

From the Target breach to the Sony intrusion to the recent WannaCry global ransomware attack, the frequency and scale of cyberattacks is increasing. Last week’s admission by Equifax that sensitive consumer information was stolen is the latest, and arguably the worst breach we’ve seen to date. Read the interview with Theresa Payton, former CIO for […]

Convergence Q&A: When and Why Should We Move to a Cloud-Based Security System?

Increasingly I am hearing about IT departments asking what direction physical security system technology is moving in, and where cloud-based applications or systems fit on security’s technology roadmap. Read the interview with Ray Bernard of Ray Bernard Consulting Services (RBCS) who explains why companies should opt for cloud computing on Security Info Watch.