Home > RSS Feeds > Security
  • Cyber-security attacks are increasing, and (ISC)2's goal is to help IT professionals address the growing complexities involved in protecting data and systems.

  • These practical suggestions will prepare your organization to respond quickly and effectively to what experts consider nearly inevitable: a data breach.

  • A network access control solution enables Broward College to manage the thousands of students and staff who access the network from their mobile devices.

  • When nearly two-thirds of the public is back to using cash for purchases—even temporarily—something is incredibly wrong with our security systems and processes.

  • By becoming familiar with applicable privacy laws and regulations and by following these best practices, organizations can help avoid costly data breaches.

  • Digital technologies and the Internet have made it possible for hackers, thieves, spies and other cyber-crooks to unleash threats on a wider and broader scale than ever before. The results of the "2014 U.S. State of the Cybercrime Survey,"  a collaborative study by PwC, CSO magazine, the U.S. Secret Service and the CERT Division of the Software Engineering Institute at Carnegie Mellon University, paints an increasingly dismal picture. Incidents are on the rise, monetary losses are trending upward and most IT organizations lack the skills to match increasingly sophisticated cyber-thieves. In fact, the report found that only 38 percent of companies have a methodology to prioritize security investments based on risk and impact to business strategy. At the heart of the problem: "Cyber-criminals evolve their tactics very rapidly, and the repercussions of cyber-crime are overwhelming for any single organization to combat alone," points out David Burg, PwC's Global and U.S. Advisory Cyber-Security Leader. "The increasing sophistication of cyber-criminals and their ability to circumvent security technologies indicate the need for a radically different approach to cyber-security: a balanced approach that, in addition to using effective cyber-security technologies, develops the people, processes and effective partnerships [needed] in order to strategically counter cyber-security threats,” adds Ed Lowery, special agent in charge, Criminal Investigative Division, U.S. Secret Service. More than 500 executives in U.S. businesses, law enforcement services and government agencies responded to the survey. Here's a look at the key findings.

  • The 2014 FIFA World Cup is putting the spotlight on the growing problem of financial fraud, and it's very difficult to prevent fraud with current technology.

  • Allowing employees to use their personal mobile devices to access the corporate network can increase productivity and morale, but it also increases risks.