It isn't just a staffing shortage that stops organizations from building cyberteams. It's a skills crisis, says SANS Institute founder Alan Paller, who tells why now is the ideal time to fill top roles with qualified professionals.
Employees are using a range of new web-based applications to get their jobs done and you've got limited visibility, let alone control. But one thing is certain - many of these applications are evasive and firewall aware and hackers are using them to penetrate networks.
How do you encourage productivity and minimize...
What is the focus of new guidelines from the PCI Security Standards Council on mobile payment acceptance security? The council's Bob Russo and Troy Leach discuss key objectives - and what's coming next.
As the overall number of "true exploits" have decreased, targeted ones - especially those initiated by criminals or nation states - are becoming harder to detect, say Rick Miller, director of IBM Managed Security Services.
Whether intentional or not, software features have the potential to leak sensitive information, corrupt data or reduce system availability. The National Institute of Standards and Technology's latest guidance aims to help organizations minimize vulnerabilities.