Securing the Internet of Things

A European judge recently blocked a security researcher’s paper describing how to bypass a car’s immobilizer theft-protection system. The Next Generation of airline control systems is designed to efficiently improve air travel, but the new system reportedly uses no encryption on its communications links, and is also missing authentication mechanisms meaning false signals could be…

Details

Securing the Cloud – Coming if You’re Ready or Not

No business can avoid “the cloud.” Some embrace cloud based services with enthusiasm as a formal way of delivering all or part of a given organization’s IT requirements, whilst others grudgingly accept them because it is near impossible to stop individual users or lines of business from building them in to business processes. A recent…

Details

They Spy on Us to Protect Us/How Dare They Spy on Us? The Pendulum Swings On

One of the security-related topics that has the least actual impact on enterprise security has been getting the most attention from the security press and the security Twitterverse: the Edward Snowden NSA surveillance disclosures. If you made a list of the top 100 risks to any company (or any individual) NSA intercepting their communications would…

Details

Skyhigh Networks Brings Discovery, Analysis and Security to Cloud Services

At the start of the year, Wisegate, the networking organization for IT and InfoSec professionals, issued a report on the Top IT Security Threats of 2013. The report opens with what these leaders say is the root cause of this year’s most concerning security threats within their organizations: “Broadly speaking, the main threats that our…

Details

Investing in Training for a Competitive Edge

“What if we train our employees and they leave?” Managers often contemplate the answer to that question. They fear employees will leave to advance their career after obtaining valuable skills. Mark Sanborn, author and leadership consultant, answers simply: “What if you don’t, and they stay?” This is not a discussion about security awareness and education.…

Details

Technical Security Solutions, Meet Security Education

How much of your 2014 budget will be allocated towards technical security solutions and how much will be reserved for security awareness education? Which one is a better use of money as you prepare for upcoming budget planning? Are they both trending in the same direction, equally? Probably not, even though Verizon’s 2013 Data Breach…

Details