You can hide from casual observers, but a motivated person will see through your attempts at anonymization.
Security / Opinions
A risk council with stakeholders from across the company could be an effective way to get needed resources to mitigate the worst security risks.
The detention of Norway’s former prime minister, when stripped of politics, was an example of proper security awareness.
The internet and smartphones have come up with five new and surprising ways to steal or expose our personal data. These trends make panic sound like a good idea.
Lots of visibility and hype around next-generation endpoint security, suites, EDR, and services at the upcoming security show
An overwhelming amount of ransomware and phishing attacks plague private and public companies. Columnist Rob Enderle writes how one CISO is successfully defending against the current threat landscape.
Just when the world seems ready to listen to us, we give it a display of epic bickering.
If you let one customer perform security tests against your applications and network, you let yourself in for a lot of headaches.
Visa dismisses the issue as a hypothetical attack method — but security researchers tried it and it worked.
Problems: Mastercard’s approach is nothing new, and its usefulness is extremely limited.
A bit of automation can ease the PCI compliance burden.
Mark Zuckerberg is under pressure to explain Facebook's role in the 2016 presidential election. The CEO downplayed the impact on its users, but if Facebook's ads can influence purchase decisions, as it claims, why wouldn't the site similarly influence people's politics?
The New York Times and GOP Arcade create the videogame about voting that the internet needed.
The latest news concerning Hilary Clinton’s email has columnist Rob Enderle ticked off because it highlights an ongoing problem regarding security breaches, assuming we are secure.
The DDoS attack against DNS provider Dyn finds our manager without a backup plan. That’s painful, especially when the plan had been to test incident response soon.
If opt-in agreements can be hidden within T&C documents, consumers will have little choice than to sign away their privacy rights.
The latest WikiLeaks revelations included a reminder that there are revealing things that just can’t be encrypted.
As critical as it is, protection will fail. You need robust detection as well.
The sphere of privacy continues to shrink.
You’d think that when it made patches pretty much inescapable, Microsoft would have made darn sure those patches were problem-free. But you’d be wrong.
Different types of analysis suit different customer strategies.
- 6 cities | 20 exhibitors | International & local keynotes | Hear from Mark Loveless 'Simple Nomad' & Jeff Lanza Former FBI - Save your seat at CSO Perspectives Roadshow
- Answer 5 quick questions and you could win a Lego Mindstorm EV3, (valued at $499).
- WIN a HTC Vive Kit valued at $1399, take this 3 minute survey for your chance to WIN!
- Participate in this market research and go into the draw to win a Lego Death Star, (valued at $999).
- Woolies welcome and aligned incentives help Woolworths improve first-half customer credentials
- Aussie Farmers Direct reveals new digitally agile strategy to boost customer engagement
- IAG CEO: Technology and digital are bolstering customer experience capabilities
- Adobe, Salesforce, Oracle dominate Gartner's list of digital marketing technology leaders
- Data and marketing innovation guides Cronulla Sharks into uncharted waters