Orchestration and Analytics are the New Infosec Buzzwords

By: March 11, 2015
analytics

(Editor’s Note: this article originally appeared as a contributed piece on infosecurity-magazine.com) As cyber security gets hotter (or maybe more and more depressing, depending on how you look at it), new buzzwords come to dominate our discussions. We’re all sick… Read More

Point-of-Sale Security for Dummies: Current Limitations in POS Protection

By: March 9, 2015
pointofsaledummies

(Today, in part four of our Point-of-Sale Security for Dummies blog series, we take a look at current limitations that exist in point-of-sale security systems. In part three, last week, we looked at advanced attacks and attackers’ motivation. In part… Read More

Information Security: The Final Frontier

By: March 6, 2015
enterprise

Have you ever watched Star Trek? Remember how the Enterprise would take heavy damage and Kirk would call down to Scotty for a repair estimate, and the chief engineer would say: “I just don’t know, Cap’n! I just don’t know!”… Read More

As Healthcare Takes Center Stage in Security, Hunting Exploits Trumps Liability Discussions

By: March 5, 2015
medrec

Healthcare records are highly sought after because they contain a treasure trove of information that cyber criminals can use for nefarious purposes. The healthcare industry has been feeling the pinch of security threats for quite some time, but with the… Read More

CTO Corner: A “FREAK” Accident or Totally Foreseeable?

By: March 4, 2015
malwarefreak

Researchers have discovered a security hole impacting millions of web sites and web servers. Like the recent Heartbleed, Shellshock and POODLE vulnerabilities, this is another flaw that impacts core components of what make up the modern Internet. There are a… Read More

4 Areas of Disconnect in Information Security That Need to Be Addressed

By: March 4, 2015
disconnect

Information security is in the early stages of a tectonic shift. As a result, there are several “disconnects” developing that organizations should take into consideration while crafting a modern security posture. Below are four key areas of disconnect I currently… Read More