The commoditization of attack infrastructure and services in the cyber-criminal underground, and the low cost and ease of launching targeted attacks, are growing concerns that require new defense strategies, says Trend Micro's Raimund Genes.
In addition to having a dedicated individual or team responsible for privacy matters, organizations must ensure their information security and IT staffs are knowledgeable about data privacy issues, says Trevor Hughes, CEO of the International Association of Privacy Professionals.
The traditional Security Operations Center is out, and the new Security Intelligence Center is in. Greg Boison of Lockheed Martin tells how security leaders are winning business support for this evolution.
The attacks have evolved, breaches have multiplied, and serious security gaps have been exposed. But what most concerns FireEye President Kevin Mandia? The rise of nation-states as leading threat actors.
Many organizations spin their wheels when it comes to cybersecurity, says IBM's Andy Land. They invest in tools that do everything except what security leaders are fundamentally tasked with doing: Protect the data.
Organizations create more data than ever, and they face more requirements to collect and present it for investigations and legal cases. How do they avoid spoiling this data? Zapproved's Sarah Thompson offers tips.
The use of Bitcoin poses big cybersecurity and money-laundering concerns for banks. But the transaction infrastructure used by cryptocurrencies offers many features that banks should put to use, says former FBI Special Agent Vince D'Agostino.
The creation of the California Cybersecurity Integration Center demonstrates that the state is taking a proactive approach to securing its digital assets, says Mark Weatherford, a former California state CISO and onetime DHS deputy undersecretary for cybersecurity.
The insider threat is one that organizations often want to overlook. But it's hard to ignore when they are losing critical assets. Lockheed Martin's Douglas Thomas tells how to sell an insider threat program.
The U.S. migration to EMV chip payment cards, which is progressing slowly, will be overshadowed by EMV-compliant mobile payments, says Gray Taylor of Conexxus, a convenience store and petroleum industry technology association.
The 6-year-old U.S. Cyber Challenge, designed to build interest in cybersecurity careers, is going strong, as participation in its online competition and cyber boot camps continues to grow, says Karen Evans, the organization's national director.
President Obama characterizes hacks of American businesses by Chinese hackers as an "act of aggression" against the United States and promises his administration will take action against the Chinese if they don't stop.
Increasingly, as enterprise leaders plan security investments, they think not just about threats and technology, but also how to tie their decisions to business performance. Gartner's Sid Deshpande explains the shift.
Drawn by the potential for low risk and high reward, criminals worldwide are increasingly pursuing online crime instead of conventional forms of property crime, such as burglary and robbery, warns cybersecurity expert Alan Woodward.