Articles By Howard Solomon

Mozilla, Firefox, browser, search engine, technology, Internet

Browser fixes: Chrome to pause Flash, Mozilla plugs holes

Browsers are the essential tools people use in computing today, so it's essential their creators keep them secure. On Thursday...

August 28th, 2015 Howard Solomon
Image from

Dormant code in malware could be a problem, or a solution

In the ongoing battle between infosec pros and malware authors once thing is certain: Uncertainty. The bad guys are always...

August 28th, 2015 Howard Solomon
cloud security

A small percentage of users cause greatest risk, says vendor

There's a long list of ways your organization is vulnerable to attack, but a cloud security vendor offers a thought:...

August 27th, 2015 Howard Solomon

More lessons CISOs can learn from a massive U.S. government breach

A government couldn't face many worse breaches than the intrusion Washington discovered at the department that does security clearances for...

August 26th, 2015 Howard Solomon
Outsourcing IT

Behind the rise in Canada of managed security providers

It's taken a while but Canadian CISOs are increasingly outsourcing elements of IT protection to managed security service providers (MSSPs)....

August 24th, 2015 Howard Solomon
Suitcase with Cash

How to protect your enterprise against ransomware

Ransomware is a threat that strikes fear into the heart of most CISOs: The sudden realization the organization is shut...

August 24th, 2015 Howard Solomon
cyber security

Attackers using Neutrino exploit kit to exploit WordPress, warns vendor

CISOs whose organizations use the WordPress content management system should be watching for signs those sites are being used in...

August 21st, 2015 Howard Solomon

Sandbox bug in Apple’s iOS affects MDM systems

A sandbox vulnerability in Apple's iOS operating system that affects mobile device management clients and certain mobile apps distributed via an...

August 21st, 2015 Howard Solomon
FEATURE Intel security bracelet

Intel’s 2FA solution: A security bracelet

Two-factor authentication has been touted as one of the surest ways CISOs can ensure that access to sensitive servers, databases...

August 20th, 2015 Howard Solomon
Data Breach Graphic

Hackers carry out threat to release Ashley Madison customer info

A number of security researchers are confident that the latest dump of personal information allegedly of customers using dating sites...

August 19th, 2015 Howard Solomon