Menu

Security / Features

How to implement an effective BYOD policy

Companies have accepted that BYOD is a reality. The challenge now is striking a balance between security and flexibility.

Written by Sarah K. White26 Sept. 16 21:58

Homeland Security issues call to action on IoT security

U.S. Department of Homeland Security’s Robert Silvers says his purpose in speaking at the Security of Things Forum in Cambridge on Thursday wasn’t to scare anyone, but then he went ahead and called on everyone in the room to “accelerate everything you’re doing” to secure the internet of things.

Written by Bob Brown23 Sept. 16 05:15

Were Apple's 'leaked' iPhone 7 tweets really a mistake?

The recent iPhone 7 launch presented Apple with a fresh opportunity to tackle Twitter, but the company's first iPhone-related tweets came a half-hour before it officially announced the phone.

Written by Matt Kapko22 Sept. 16 22:00

Why (and when) outsourcing security makes sense

Offloading security strategy and day-to-day operations to a managed security service provider can free up IT resources. But be prepared: It’s not an entirely hands-off proposition.

Written by Beth Stackpole21 Sept. 16 20:42

How flexible should your infosec model be?

Organizations need to stay on top of a fast-shifting threat landscape by updating their security policies -- without badgering users into a state of noncompliance.

Written by Beth Stackpole21 Sept. 16 20:30

ISF consulting services seek to strengthen cyber resilience

The Information Security Forum has announced its global ISF Consultancy Services, which offer short-term customized professional support and training to help organizations build cyber resilience and improve their security posture.

Written by Thor Olavsrud21 Sept. 16 02:57

FBI urges ransomware victims to step forward

The FBI has issued a plea for those who have been hit by ransomware to report this to federal law enforcement so that the country can get a better sense of just how bad this problem really is.

Written by Bob Brown16 Sept. 16 23:38

Government ill-equipped to thwart cyberwarfare

The U.S. infrastructure is outdated and vulnerable to cyberattacks. If government reaction doesn’t improve the country electrical could be crippled.

Written by Jen A. Miller09 Sept. 16 02:10

How it works: Iris scanning improves smartphone security

Samsung and other vendors are beginning to incorporate iris scanning into their mobile devices. We examine how this security technology works, its advantages and its drawbacks.

Written by Lamont Wood08 Sept. 16 20:00

Carnegie Mellon University helps you control your privacy

Managing your personal data in the digital age has become almost impossible. But Carnegie Mellon University has found that a combination of natural language processing, privacy preference modeling, machine lanuguage, crowdsourcing and privacy interface design may make the impossible possible.

Written by Thor Olavsrud08 Sept. 16 04:11

5 commonly misunderstood compliance terms

Understanding the terms is critical given the complexity of compliance, and will help you when analyzing the best technology solutions to manage compliance as a whole

Written by By Dave Packer, ‎VP, Corporate and Product Marketing, Druva31 Aug. 16 05:50

Keep using password managers -- bugs and all

A furor over bugs in password managers left users in a jam. Self-proclaimed security empress Jessy Irwin clears up the confusion

Written by Fahmida Y. Rashid19 Aug. 16 20:00

Why a security team embraces shadow IT

A group within Western Union information security team relies on cloud software, including content management, social collaboration and single sign-on tools to let employees to get their work done while protecting corporate data.

Written by Clint Boulton18 Aug. 16 21:00

Market Place

Computerworld
ARN
Techworld
CMO