Automobiles have crash ratings. Do they need ratings for cybersecurity, too? In this interview, security expert Jacob Olcott of BitSight Technologies previews a session he'll moderate at the RSA Conference 2016 that will address this question.
George Orwell's "1984" imagined an authoritarian society in which the government monitored citizens via their televisions. Viewers who want to play along at home can begin by buying a Smart TV.
Apple CEO Tim Cook has blasted a U.S. federal judge's Feb. 16 order compelling Apple to help bypass the encryption on an iPhone seized by the FBI, saying the crypto backdoor would set a "dangerous" precedent.
We hear a lot about security in regulated verticals such as financial services and telecom. But what are some of the challenges unique to manufacturing? Tata Motor's CISO Uday Deshpande shares insight and recommendations.
Warning: Too many voice over IP devices being used in enterprise environments have well-known default passwords or no security at all, thus leaving organizations at risk from covert surveillance and toll-fraud scammers, experts say.
The U.S. and U.K. government push to "backdoor" strong crypto - used to secure everything from online banking and e-commerce to patient health records and consumer communications - wouldn't stop most criminals or terrorists, researchers warn.
Hong Kong toymaker VTech has revised its end-user license agreement to make clear that it can't be held legally responsible for any data breaches. Many security experts have reacted with fury. But is VTech's move unusual?
Even as the demand for security professionals grows, the outflow of practitioners from the profession is greater than the influx of fresh blood, says (ISC)² CEO David Shearer. How can this trend be effectively addressed?
Here's more evidence of how a data breach can have a major financial impact. The bill for U.K. telecom giant TalkTalk's October 2015 data breach could be as much as $94 million, and the incident resulted in the loss of 95,000 customers.
Java users are being warned to only use newly released installers to avoid a nasty potential exploit. Meanwhile, a veteran bug hunter questions whether Oracle's move to ditch Java browser plug-ins will have a significant security upside.
The trend across industries is that automation results in a drastic reduction of operational job roles, even as it brings in economies of efficiency. What then does automation in security mean for the profession?
"We never negotiate" might be the expectation whenever law enforcement or government agencies get targeted by criminals or even "cyberterrorists." But outside Hollywood, the reality too often turns out to be far less rigid.
The new EU-U.S. data transfer agreement will be called "Privacy Shield." Beyond that, however, the actual details of the agreement - and whether it will pass muster with the EU's privacy commissioners or high court - appear to be a work in progress.
Chris Rohlf, Yahoo's penetration testing and red team leader, describes how he helps the company take a proactive security approach - and the skills required to get the job done.
Sometimes language barriers can be a good thing: Many malware-wielding cybercriminals have historically targeted users in North America and Europe over Japan, owing to linguistic challenges. But that's changing.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.co.uk, you agree to our use of cookies.