Quantcast
Channel: CIO Intelligent Cybersecurity for the Real World
Browsing latest articles
Browse All 66 View Live

BrandPost: New Opportunities, New Risks: The Internet of Things and Business...

The Internet of Things (IoT) is creating unprecedented opportunities for both individuals and organizations to gain greater value from networked connections among people, processes, data and things....

View Article



BrandPost: Happy New Year – Now Time For That New Year’s Resolution…

As most of the working world slowly comes back online after the festive break and we all start thinking about fitness regimes and other changes to our lifestyles, we might want to consider a more...

View Article

BrandPost: Paper, Plastic or Compromised Security? The Point-of-Sale Risk in...

As technology becomes smarter and more intuitive, conveniences like tableside payment kiosks in busy restaurants have become more commonplace, leading to highly personalized (and time-saving)...

View Article

BrandPost: NSS Labs Report on Cyber Resilience Highlights the Need for a New...

A few years ago, a point-product security vendor proudly declared their technology was the silver bullet that stopped all security threats from penetrating the corporate network. Many of us in the...

View Article

BrandPost: With Multi-Vector Attacks, Quality Threat Intelligence Matters

In the last year, the world’s attention has been riveted by a series of high-profile hacks of major corporations in retail, finance and the entertainment industry, among others. Each of these...

View Article


BrandPost: Malvertising Is Not an Impossible Threat to Beat

Malvertising has been a problem for CIOs and CSOs for a few years. 2015 stands to be no different, as it is examined in the Cisco Annual Security Report for 2015. Malvertising tactics from...

View Article

BrandPost: The Industrialization of Hacking: Part 1 – An Introduction

This is the first installment of a four part series over the next two weeks on The Industrialization of Hacking.The evolving trends of mobility, cloud computing, and the Internet of Everything (IoE)...

View Article

BrandPost: The Industrialization of Hacking: Part 2 - The Cybersecurity Arms...

This is the second installment of our four part series on The Industrialization of Hacking. Previously, I introduced the concept of the Industrialization of Hacking, creating a faster, more effective...

View Article


BrandPost: The Industrialization of Hacking: Part 3 - The Attack Chain

This is the third installment of our four part series on The Industrialization of Hacking. Previously, I discussed the risks and opportunities the Internet of Everything introduces for business and...

View Article


BrandPost: The Industrialization of Hacking: Part 4 - A Threat-Centric and...

This is the final installment of our four part series on The Industrialization of Hacking. Previously, I discussed the risks and opportunities the Internet of Everything introduces for hackers and...

View Article

BrandPost: Resilience: A Smart Strategy for Life, Business, and Cybersecurity

It is a well-known principle in both science and business that those who survive in this world are not necessarily the strongest or smartest, but those who best adapt to changing circumstances. I was...

View Article

BrandPost: Data, Data, Everywhere…

It used to be a common sight on the street to see people walking along with their mobile phones clenched to their ears. But increasingly this has changed to the view of people heads down, looking at...

View Article

BrandPost: Real-World Security is the Ability to Protect the Ultimate Asset:...

We recently released the Cisco 2015 Annual Security Report and have now used it as a platform to introduce the inaugural Cisco Security Manifesto. Our motivation for creating this set of security...

View Article


BrandPost: Is it Time for That Spring Cleaning?

Spring cleaning is traditionally an activity undertaken as the seasons change in the home. But we in the business world would be well advised to take a leaf out of this particular book and expand the...

View Article

BrandPost: Time to throw away the 80-20 security rule?

For many years security policies have been largely governed by the notion of the 80-20 rule. This states that 80% of security risk is effectively managed by implementing the most important 20% of...

View Article


BrandPost: People Remain the Weakest Link in Security

A new survey was unveiled last week by the UK consumer association, which reported the top five email scams to be aware of for 2015.Anyone who checks their spam folder in their email regularly will...

View Article

BrandPost: A World of Mobile Delights – And Dangers

As a consumer watching from afar, the announcement of new smartphones and other mobile devices coming out of the annual Mobile World Congress in Barcelona fill me with excitement. After all who can...

View Article


BrandPost: Criminals shopping for your data

We know that Cybercriminals ‘follow the money’ and constantly target industries and individuals who can provide them with the most valuable data and information they can utilize to make money....

View Article

BrandPost: Don’t Get Dazzled by the Shiny New Threat

The recently launched Verizon Data Breach Report 2015 gathered many news headlines because of its bold statement that security threats to your mobile phone are generally "overblown." The report...

View Article

BrandPost: Spam continues to thrive thanks to ‘snowshoe’ strategy

Tech pundits and vendors have been prematurely declaring the death of email for over a decade. However, email remains the dominant form of communication for businesses and individuals around the world...

View Article

BrandPost: Mind the Cyber Gap

The age of the Internet of Things and the Industrialization of hacking is transforming all businesses and the way they need to think and behave in a connected world. Further evidence of this was...

View Article


BrandPost: Evaluating Threat Intelligence Solutions?

When you hear the term “Threat Intelligence,” it’s easy to have preconceived notions of what it means. Or, since it’s become security’s latest buzzword, to wonder if everyone talking about it means...

View Article

Browsing latest articles
Browse All 66 View Live




Latest Images