How do I get my employees to stop clicking on everything?

If you’ve been given responsibility for network security in a non-technical area of the business, there’s one eternal question that has been bedeviling admins for decades. Shelves of words have been spilled on the subject, to limited result. Everyone with cybersecurity responsibilities has their own crop of horror stories where an intransigent user has clicked…

Corporate Legal Counsels Fret Over Cybersecurity

A majority of in-house legal counsels at US corporations view data breaches and cross-border data privacy regulations as among their biggest e-discovery related legal risks. BDO Consulting, a company that provides financial, business, and technology advisory services, recently surveyed over 100 senior legal executives at organizations ranging in size from $100 million to over $5…

What CISOs Need To Know Before Adopting Biometrics

Biometric techniques offer a solution to the password problem, but getting started can be tough. Here are a few things you need to know. Businesses have long sought a better way to balance end-user security and usability, and it’s clear the password-only model needs to change. Faced with employees who are unwilling to remember more…

Machine Learning For Cybersecurity Not Cybercrime

The cybersecurity industry has always been under constant strain from cybercriminals and malware. With increasing integration of hardware, software and services being built into every aspect of our lives, the task of keeping data secure has become even more difficult. The arsenal of tools that cybercriminals now have at their disposal has raised concerns for…

The Pick of 2017 Cybersecurity Conferences

Cybersecurity conferences provide excellent opportunities to network with peers, learn about the latest trends in security, engage with vendors and see firsthand the latest developments in technology. Here is a roundup of some of the most interesting 2017 cybersecurity conferences.

The Four Leading Security Threats of 2017

The security landscape is constantly evolving and will continue to evolve in 2017. Long-standing security threats will take on new dimensions. Social engineering, for example, will become an output as well as an input. At the same time, the Internet of Things (IoT) continues to open new threat vectors. The new year will certainly bring…

Tor Browser Patches Start Being Uplifted into Firefox

The Tor (The Onion Router) team and Mozilla are working together to implement Tor browser patches directly into Firefox and tighten their collaboration. The Tor browser is built almost entirely on Firefox, with 95% of its code coming from Mozilla’s browser. However, it still needs a series of changes, which the team refers to as…

Cyberrisk Through A Business Lens

As with any other aspect of operating a business, effectively managing cyberrisk is predicated on making well-informed decisions and then executing reliably within the context of those decisions. With that in mind, boards and senior executives must ensure that their organizations accomplish both. For the reasons described below, today many organizations are unable to do…

Chip-and-PIN Credit Cards, One Year On

The U.S. was not an early adopter of chip-and-PIN credit cards, lagging behind major European countries and others. But more than a year after the official mandatory shift to this technology, the transition has reshaped most credit card transactions. As a result, the rate of credit card fraud is down sharply.