What CISOs Must Know About Fighting Identity Theft
Posted on: 05 Oct 2014
High-level strategies for defending against attacks to steal identities are twofold: solutions on the back end, and what consumers and business partners can do to protect themselves. Almost daily, we…
Blending Two Cultures: Management Perspectives on Converging Physical and Information Security
Posted on: 27 Jan 2014
Hey, here’s a good idea: let’s have the part of facilities management that deals with the physical security of the office park, the factory, and the government facility work with…
Scared of SCADA? Maybe It’s Cultural. Read a Children’s Book
Posted on: 14 Jan 2014
There is growing concern over the security of SCADA (supervisory control and data acquisition systems), one of the Internet of Things topics discussed at the Amphion Forum conference recently held…
How You Should Be Thinking About the Information Security Budget
Posted on: 25 Nov 2013
So, how did you do this year with your security budget requests? And how does the plan look for next year? With information security representing a competitive arms race with…
Does the NSA Use Quantum Computing to Break Things?
Posted on: 20 Nov 2013
In the continuing stream of revelations about reported NSA hacking to protect national interests comes more news. Data moving between data centers operated by the world’s largest Internet email companies allegedly…
YAC/YAM, Log Management, SIEM and Big Data Security Intelligence
Posted on: 06 Nov 2013
Maybe it’s just me, but many market analysts tend to be skeptical about the latest shiny new thing promising the “complete solution” in security and other technology initiatives. Skepticism is fueled…
Skeptical of Biometrics? Have a Backup Plan
Posted on: 22 Oct 2013
So whoopie-do, the new iPhone has a fingerprint reader to unlock the phone as a market differentiator, and to open new authentication applications and developer opportunities – assuming Apple opens…
Securing the Internet of Things
Posted on: 22 Oct 2013
A European judge recently blocked a security researcher’s paper describing how to bypass a car’s immobilizer theft-protection system. The Next Generation of airline control systems is designed to efficiently improve…