Security

A company’s data is of the utmost importance, and protecting that data is a big job. Having just the right restrictions on your network (not too little, not too much) is a delicate balance, and new trends such as BYOD are providing unique challenges. These articles cover the implementation of network security at the corporate level, as well as news regarding the latest threats and fixes.


How Should the Legal System Handle Robot Crime?

It’s only a matter of time. If botnets are already being used to commit cybercrime, soon robots themselves may become common tools of criminals. The question is, how will the law address this when it inevitably happens?

SHARE THIS ARTICLE

That Secure Domain May Not Be So Secure

A Unicode-based attack known as a homograph attack can falsify a domain name—all the way down to secure HTTPS. Since it can so convincingly mimic a legitimate domain, it isn’t just the average user at risk but also seasoned IT pros.

SHARE THIS ARTICLE

Mobile Security Precautions

Many employees use mobile devices for work purposes, and these devices can be open to security vulnerabilities. Read on for several mobile security precautions that should be at the very top of IT’s priority list.

SHARE THIS ARTICLE

Humans: The Weakest Cybersecurity Link

Social engineering schemes, such as phishing and ransomware, are often at the source of company data breaches that are due to the humans that are the weak link in the cybersecurity chain. Here’s what organizations can do prevent attacks and, if necessary, mitigate the damage.

SHARE THIS ARTICLE

Can Your Virtual Assistant Be Trusted?

Business leaders love their phones, and with the advent of virtual assistants, they also love talking to Alexa, Siri, Cortana, and Google Now. But can these virtual assistants be really trusted with company secrets? Read on for what IT leaders need to know.

SHARE THIS ARTICLE

A New Cybersecurity Training Platform

The new Cybersecurity Nexus Training Platform and Assessment Tool from ISACA offers on-demand, hands-on training and skills assessment in a live lab environment that can help cybersecurity experts learn faster through real-world situations.

SHARE THIS ARTICLE

Who’s Most Likely to Fall for a Hack?

When you think of a common victim of identity theft, phishing scams, or other hacks, several stereotypes may spring to mind—perhaps bumbling luddites. However, a new study reveals that the majority of victims are quite the opposite.

SHARE THIS ARTICLE

What Really Prevents Data Breaches?

Is it processes? Is it technology? Or is it people? Many cybersecurity experts say that people are the most important part of the puzzle, not IT security processes. One writer argues that while this assertion is politically correct, it’s not, well … Actually correct.

SHARE THIS ARTICLE

What Does the C-Suite Need to Know About Cybersecurity?

Analysts and experts are starting to say what IT leaders have known all along: CEOs, board members, and other people in the C-suite need to know all they can about cybersecurity and must not leave those matters for IT to deal with alone.

SHARE THIS ARTICLE

Many Paths Toward Security Careers

There are a variety of ways that one can begin a successful career in cybersecurity. This is almost by necessity, as there are actually not very many formalized routes into the field. See a few of the many ways one can end up in this high-demand job.

SHARE THIS ARTICLE