Articles By Howard Solomon

More ‘widgets’ coming for McAfee endpoint suite, says exec

McAfee LLC gained its independence from Intel Corp. earlier this month, but it wants more attention from infosec pros than...

April 28th, 2017 Howard Solomon
Security password

Weak, stolen passwords still a leading factor in breaches: Verizon report

Odds are your organization will be breached through a hack than any other method, and most likely by attackers leveraging...

April 27th, 2017 Howard Solomon

Patch management essentials

Patch management is one of the drudge jobs that CISOs have to assign their teams to do, but it is...

April 26th, 2017 Howard Solomon

Why creating a Purple Team will improve cyber defence

We often deal in a world of win or lose: Business deals, sports, wars. The same is true for the...

April 25th, 2017 Howard Solomon
information security mind map

CISOs must get a better handle on the effectiveness of their arsenals

As a CISO you know what you have for defending the enterprise, but do you know what works? Your inventory...

April 24th, 2017 Howard Solomon

Risky business: 45 per cent of employees admit to unsafe data access practices

Most employees know how important it is to protect sensitive enterprise information, but in practice many admit they engage in...

April 21st, 2017 Howard Solomon
security and privacy issues

What confident CISOs have in common

What works in protecting an enterprise is a matter of debate in an era when the proper way for a...

April 20th, 2017 Howard Solomon
People standing in a business meeting

Fighting ‘the boy’s club’ mentality in cyber security

Few IT leaders would deny that having staff with a wide range of backgrounds is an advantage. But with men...

April 19th, 2017 Howard Solomon
danger sign, IT risks, security, malware, hackers

A mysterious IoT botnet, and what network admins can do to lower the odds of infection

It's not very often that infosec pros get a warning of an threat on the horizon, but a news report...

April 17th, 2017 Howard Solomon
security and privacy issues

How to turn threat information into threat intelligence

Infosec teams face a deluge of data every day from an array of network and application sensors as well as...

April 17th, 2017 Howard Solomon