Should You be Worried about Hacktivism?

by Geoff Webb, director of Product Marketing at Credant Technologies Hacktivism is hardly a novel concept but there continues to be a vocal debate over what hackers are after and why they pursue specific targets. Should organizations worry in an enterprise-wide holistic sense about how to counter hacktivism or instead focus on a single set…

Hiring Softens but Staffing to Remain Stable

Technology executives expect continued IT hiring in the second quarter of 2012, albeit at a slower pace than three months ago, according to the just-released Robert Half Technology IT Hiring Index and Skills Report. In the latest quarterly survey, eight percent of CIOs said they plan to expand their IT departments, and five percent expect…

Leonardo da Vinci and the ‘Real APTs’

by Geoff Webb of Credant Technologies Leonardo da Vinci once said, “Even the richest soil, if left uncultivated, will produce the rankest weeds.” It’s a sentiment with which gardeners everywhere can empathize. If there’s one thing you can be certain of, when it comes to weeds, it is that they thrive on a lack of…

The Security Tools CIOs are Buying Now

Security issues are so ubiquitous that many CIOs are tempted to bow to the seemingly inevitable and just buy insurance to blunt the losses. Cyber insurance coverage may be a good idea for some companies but it should never be used as a cop-out on locking the data center doors. Fortunately, most companies are continuing…

How to Set Up a High-Performing Security Team

by Jeff Bardin of Treadstone 71 Most IT execs like to speak of methods on securing funding, implementation of the latest technology, or performing enterprise-wide risk assessments but this completely overlooks the impact that people can have on building such a high performing security program. When security executives overlook team creation as a core component…

How to Manage the BYOD Quandary

by John Lytle of ISG Employees of large business enterprises are increasingly bringing iPads, iPhones, Android, and other devices to the office and using them for work-related purposes. This trend, the consumerization of IT or the bring your own device (BYOD) phenomenon, has CIOs concerned, and rightly so. The proliferation of personal electronic devices in…

IT Risks Are Manageable

by Ed Airey of Micro Focus The enterprise ecosystem is changing at an unprecedented rate and though helpful in adapting to this change, technology is also making it difficult to keep up with the myriad threats to your IT organization. So where do you begin? Try looking at the areas of IT that are at…

2012: The More Things Change …

by Geoff Webb of Credant Technologies It’s the most wonderful time of the year. At least, it is according to Andy Williams. At the very least, it’s that time of the year when people in the security industry start to make predictions about what’s going to happen next year. You’d think that in the fast…

Top 13 Security Trends to Watch in 2012

The security challenges facing businesses and consumers in 2012, will begin to merge as “always-on, always-connected” gives way to “hyperconneted” — a world where mobile devices double as everything from ATMs to heart-rate monitors, credit cards and network access endpoints. “The proliferation of Internet connectivity, mobile devices and Web applications are helping to enrich lives…

Cyber Security: Are Stricter Regulations the Answer?

by Torsten George of Agiliance On October 13, 2011 the Securities and Exchange Commission (SEC) Division of Corporation Finance released a guidance document that outlines disclosure practices for public companies in light of the most recent spike in cyber security attacks and associated data breaches. The guidance document hints that companies have to be paying…