No company wants to leak customer data, have intellectual property stolen, or experience business services taken offline. Those that recognize these risks are thus scrambling to hire the right people to fill their information security roles.
We’ve heard about cyberattacks against critical infrastructure sites and systems including dams, railroads, electrical grids, and even nuclear power plants. But it doesn't stop there. And it may not even begin there.
New features such as the Antimalware Scan Interface, Virtualization-Based Security and threat analytics are making Windows much more difficult to exploit, but hackers and researchers demonstrate it's still not impossible.
Bug-finding programs are valuable to enterprises, but they require a lot of planning and effort to be effective. Sean Martin looks at what goes into taking a bug bounty program public.
The Cloud Security Alliance (CSA) Big Data Working Group recently released a new handbook: The Big Data Security and Privacy Handbook: 100 Best Practices in Big Data Security and Privacy. This slide show looks at number 9 in the list--Granular Access Control.
Demand continues to rise for cybersecurity professionals throughout the US, and the salaries seem to follow suit. New data shows best cities for salary and cost of living.
Education and training are crucial parts of a strong application security program. Sean Martin explains how enterprises should build these elements into their programs.
Cybercriminals are increasingly looking to macro variants, leaving organizations to defend against advanced tactics like macro-based malware attacks any way they can.