Home Tags Security strategy

Tag: security strategy

US faces limits in busting Russian agents over Yahoo breach

In a rare move, the U.S. has indicted two Russian government agents for their suspected involvement in a massive Yahoo data breach. But what...

IDG Contributor Network: Preparing for the professional cybercrime industry

Cybercrime has become big business.These days, you’re not protecting your information systems from a guy in his basement who hacks random websites for the...

Hacktivist or script kiddy? Know your 10 types of hacker

Different shapes and sizesImage by ThinkstockHackers, like the attacks they perpetrate, come in many forms, with motivations that range from monetary to political to...

Organizations Failing to Implement Planned Cyber-Security Strategies

Intel's Security's survey of cyber-security operators and executives finds that among its top findings, nearly all organizations say they have a cyber-security strategy in...

There’s Disconnect Between Security Execs, Operators, Report Reveals

An IBM Security survey finds a disparity between cyber-security operators and executives on how they think their security strategy is faring.

Survey Finds Disconnect Between Security Strategy and Execution

Report from Intel Security and CSIS discovers 93% of businesses have cybersecurity strategies, but only 49% fully implement them.

Mimecast Tackles Email-Bound Risks

At RSA, Mimecast cyber security strategy Bob Adams discusses graduating from basic filtering to true email security risk assessment.

Juniper Discusses The New Network & How To Secure It

At RSA, Mihir Maniar, Juniper Networks' vice president of security products and strategy, and Laurence Pitt, Juniper Networks' EMEA security strategy director, discuss how...

New BAE Systems Study Digs Into Defense

At RSA Conference, BAE Systems Vice President of Cyber Security Strategy Colin McKinty discusses businesses' wide challenges of understanding and responding to the threat...

Dell Explains Why Hardware and Software are Needed for Security

Speaking at the RSA Conference, Michael Dell discusses his company's security strategy.

Study: 62% of security pros don’t know where their sensitive data...

Ask organizations today about the value of data and you’re likely to hear it measured in terms of competitive advantage, customer experience and revenue...

SHA-1 End Times Have Arrived

For the past couple of years, browser makers have raced to migrate from SHA-1 to SHA-2 as researchers have intensified warnings about collision attacks moving from...