How New Technologies Are Providing New Openings for Hackers

The evolution of cloud and mobile technologies, along with the growing number of internet-connected devices, is presenting new opportunities for hackers and new cybersecurity challenges for businesses. Read the interview with John Hering, the co-founder and executive chairman of Lookout Inc., and Andrew Rubin, co-founder and chief executive of Illumio who explain how the new technologies […]

70% Of Firms Report A Cybersecurity Incident: Why Marketers Should Care

Since the Target and Sony hacks, I have been interested in marketing’s role (or lack thereof) in preparing for and managing the consequences of data breaches. As part of a series exploring the topic in detail (see article #1 here), I talked with Holly Rollo, the CMO of RSA, a Dell Technologies business. Read about […]

Enterprise information security and privacy reliant on culture

Studies continue to show that insider threats are a big risk to companies’ data protection efforts. But despite these well-known, highly publicized threats, corporate leadership often does not do enough to set the right information protection tone in their organizations, according to Grace Buckler, founder of privacy consulting firm The Privacy Advocate LLC. Read the […]

Security and the Internet of Things [Q&A]

Last year saw the Mirai botnet harness routers and other IoT devices to launch DDoS attacks against internet services. Is this type of attack something we’re going to see more of in 2017, and what can companies and individuals do to protect themselves? We spoke to Sam Rehman, chief technology officer at attack prevention specialist Arxan […]

Venture Capital Pioneer Vinod Khosla Says AI Will Lead to Massive Job Displacement

Vinod Khosla is among the world’s most influential venture capitalists. He co-founded Sun Microsystems and served as its CEO before joining Kleiner Perkins Caufield & Byers. Mr. Khosla, 61, now runs Khosla Ventures. CIO Journal met with Mr. Khosla at the Structure technology conference in San Francisco on November 8. Read more about the interview […]

Inside the Mind of Cyber Criminals

To learn more about how cyber criminals operate in the dark web, we asked our own Andrei Barysevich a few questions. Below is what he had to say. You have spent a great deal of time studying actual cyber crime activity, forums, and behavior in recent months. What are some of the things you’ve learned that […]

With hacking as a profitable venture, the need for computer security grows

Dave Newell has been keeping computers secure since before information security even existed as a defined profession. As founder of East Aurora-based cybersecurity firm Loptr LLC, he’s at the forefront of the field today. Read the interview with Dave Newell of Computer Task Group who says that the need for cyber security is growing as […]

Cyber security basics: How to recognise phishing attacks

Phishing attacks are on the rise, but how can you recognise them? CBR’s Alex Sword talks to Luis Corrons, Technical Director at PandaLabs. Read the interview with Luis Corrons of PandaLabs who explains the basics of Phishing on Computer Business Review.

Q&A: With ransomware threat on the rise, is IoT the next victim?

The ransomware threat to the enterprise continues to rise: A recent report conducted by Osterman Research that surveyed 540 CIOs, CISOs and IT directors in the U.S., Canada, U.K. and Germany found nearly 40% of businesses experienced a ransomware attack in 2015. Read the interview with Etay Maor of IBM who shares insights on the strategies […]

How to Avoid Becoming Easy Prey for Visual Hackers

Mari Frank is an attorney, mediator and digital privacy expert. As the chair of the Privacy Committee of the State Bar of California, Law Practice Management and Technology Section and a member of the Visual Privacy Advisory Council, Frank understands the lengths some criminals—and disgruntled employees—go to in order to embarrass a company, steal confidential […]