The Case for Converged Tech Operations

Does the Rise of CenTOC Improve Business Alignment?"Align technology with businesses" is an old phrase. But information security is now part of this change, making strides to align with growth as a... Read more »

Why Are We So Stupid About Passwords?

Sony's Experience Suggests Poor Attention To DetailThe latest entrant into the password "hall of shame" is Sony Pictures Entertainment. As the ongoing dumps of Sony data by Guardians of Peace highlight, Sony... Read more »

Morgan Stanley: Insider Stole Data

Employee Posted Some Client Information OnlineFinancial services company Morgan Stanley has fired an employee who it claims stole account data for hundreds of thousands of clients and posted a small subset of... Read more »

RBI to Ease Transaction Security?

Critics Fear Move Would Increase FraudThe Reserve Bank of India is considering removal of its two-factor authentication requirement for small-value transactions. The goal: to facilitate easier transactions. But security experts fear the... Read more »

Google Discloses Microsoft Zero Day Flaw

Windows 8.1 Vulnerability Unfixed After 90 Days, Google SaysMicrosoft says it's prepping a patch for a Windows vulnerability that was recently disclosed by Google. The search giant's 90-day deadline for vendors to... Read more »

Obama Imposes Sanctions on North Korea for Hack

U.S. Takes Action After Sony Pictures AttackHolding North Korea responsible for the cyber-attack on Sony Pictures Entertainment, President Obama on Jan. 2 imposed sanctions on 10 individuals and three entities associated with... Read more »

Securing the Borderless Enterprise

More and more, the applications that run your business expand beyond your organization's control to cloud-based services and partner-hosted websites. With so many separate sets of credentials and different login processes to... Read more »

Security Alerts: Identifying Noise vs. Signals

CIOs and CISOs invest millions of dollars to secure their organization and keep would-be attackers out of their networks. But despite these investments, determined attackers routinely breach seemingly secure organizations and steal... Read more »

Keynote: The State of Fraud Today

Read more »

Technology Spotlight: Identity Theft Protection Using Advanced Analytics

Read more »