FireEye, like all companies, wants to protect its intellectual property. But it needs to realize that security companies aren’t perceived like other companies.
Security / Opinions
SSO will bring several benefits, but our manager has to be prepared to address any security lapses that could accompany it.
All companies need to pay more attention to the experience that ordinary users have when they try to install new products and upgrades.
It’s a matter of getting product developers to overcome their naïveté, ignorance and laziness. Harsh? Yeah, but the truth hurts.
That’s what hackers are — they should be feared, but our fears are completely out of proportion.
Famous shipwreck holds many lessons for the cybersecurity community
The annual security conference was a chance to go deep. But back in the office, how do you get 100% of the company’s employees to complete the security awareness training?
Employers misjudge how potential insider cyberattackers will judge the risks and payoffs from their crimes.
It’s time to put Flash out of our misery once and for all. And, thanks to Google, it may finally happen.
Google has made a big leap forward with real-time image recognition that can be applied to pedestrian detection. This is good news for potential accident victims out there. But the privacy implications!
IT pilot fish goes to work at a large retailer's distribution center, where the policy is that passwords must be changed every 90 days -- which turns out to have unexpected consequences.
Oracle Chief Security Officer Mary Ann Davidson let loose a long rant about people who dare to look into the security of the company’s products. Oracle quickly backed away from those remarks, but has it faced up to the fact that its CSO has some wrongheaded notions about her own area of expertise?
Shadow IT brings many security issues, but since these systems are not on IT's radar, they do not get factored into overall risk management strategy. Here are some practical suggestions.
Data management, scale, and algorithmic strengths may give Facebook an advantage in the threat intelligence platform sharing platforms market
Wi-Fi can be done securely, even at a hacker conference like DEF CON. Just avoid open networks and Android.
Digital transformation is a huge opportunity for CIOs but it starts with IT transformation.
Attending both for the first time was a chance to compare and contrast.
Non-compliance is a risk, and the Attorney General's office carries a big stick for those who don't follow the rules.
This retired pilot fish notices that nothing has shown up in his email in-box in almost 12 hours, which almost never happens. And when he tries his broadband provider's web mail access, he's got another problem.
We bought a next-generation firewall, as I had hoped we would. The real trick, though, was getting the IT department to take full advantage of all of its advanced functionality.
- UNIQLO uses neuroscience to match your T-shirt to your mood
- How Citrix is driving customer conversions with a new startup technology
- Research: High social media usage set to change brand engagement strategy
- How Ticketek is using a DMP to not only target audiences, but pivot its business
- Embracing digital transformation in the finance sector