Andy Ellis, chief security officer of Akamai Technologies, says that in today's burgeoning information security talent marketplace, as a hiring manager the quality he hires above all is passion.
In his new role at a new company, security veteran Sam Curry is both CSO and CTO at Arbor Networks. What are the unique challenges, as well as the opportunities to improve how organizations protect their digital assets?
Dr. Zulfikar Ramzan is the new CTO at RSA, and he's focused on advanced threats. What are the technology nuances behind today's top threats, and how can organizations best defend themselves?
The Department of Homeland Security will establish a Silicon Valley satellite office to improve relations with IT security vendors and recruit cybersecurity talent, Homeland Security Secretary Jeh Johnson said in a keynote address at RSA Conference 2015.
The threat landscape is constantly changing, and so is the information deemed valuable to hackers. Tom Kellermann of Trend Micro discusses how organizations can improve how they protect data.
Threat intelligence and information sharing - the quickly emerged as dominating topics at RSA Conference 2015. ISMG's executive editors share their takeaways from the first half of the week-long event.
Europe does not know the true extent of its data breach problem, says Europol advisor Brian Honan, owing to the lack of a U.S.-style breach notification law to alert European consumers when their data has been stolen or exposed.
Direct from the show floor at the Moscone Center in San Francisco, ISMG offers for the first time ever a live streaming video feed of exclusive interviews with the world's top information security leaders.
The future of cybersecurity may be full of surprises. But these twists will cause a big sensation, says Christofer Hoff, vice president and chief technology officer at Juniper Networks.
The Target breach was the hot topic for many RSA 2014 attendees, but Gartner's Avivah Litan was already talking about the next Target - a UK retailer that may have suffered a similar hack, exposing payment card data.
White House Cybersecurity Coordinator Michael Daniel says the toughest international cybersecurity challenge facing the Obama administration is getting cooperation in coordinating responses to online crime.
A new U.K. government report accuses social networks of serving as a "safe haven for terrorists," inflaming what some see as tense relations in the post-Snowden era between the British government and Silicon Valley.
A massive international operation has resulted in the arrest of 118 people suspected of using stolen card data to buy airline tickets, or using fake tickets, thanks to big data capabilities for combating crime.
As news of the Shellshock bug continues to spread, CISOs in all sectors are taking steps to mitigate the risks posed by the vulnerability. Likewise, regulators and industry groups have ramped up dissemination of alerts.
The social media savvy Islamic State frightens most of the world with its gruesome Internet postings of executions and online recruitment of new Jihadists. But is the terrorist group likely to launch cyber-attacks?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing securityintelligence.inforisktoday.com, you agree to our use of cookies.