security and privacy issues

How to craft a threat intelligence strategy

An increasing number of CISOs are realizing the value of threat intelligence to protecting the enterprise, helping the infosec team...

July 19th, 2016 Howard Solomon


As a blockchain-based project teeters, questions about the technology’s security

A version of this article originally appeared in the July 2016 issue of CSO Digital There's no shortage of futurists,...

July 18th, 2016 Howard Solomon


Smart contract vulnerability a warning to CISOs, developers

Among the hype surrounding the possibilities of blockchain-based applications is the promise of so-called smart contracts, applications that execute and...

July 18th, 2016 Howard Solomon

Gavel in court

U.S. law can’t force American service providers to turn over foreign data: Court

Organizations  worried about the ability of American law enforcement agencies to get at electronic data in foreign data centres have...

July 15th, 2016 Howard Solomon

Image from (c) Maksim Kabakou

Warning: Upcoming Trojan includes tools to blackmail insiders

Most threats to corporate data come from external actors but the possibility of employees to steal, manipulate or destroy assets...

July 15th, 2016 Howard Solomon


Organization’s cyber security can have an effect on acquisition, says report

There are three common reasons cyber security has to be among the top priorities for the C-suite: To maintain confidence...

July 14th, 2016 Howard Solomon

Matrix Style Password Graphic

Don’t confuse a vulnerability assessment with a penetration test: Vendor

Infosec pros often find vulnerabilities during a penetration test, but that isn't a vulnerability assessment. The two shouldn't be confused,...

July 13th, 2016 Howard Solomon

ransomware, blackmail

Another reason why paying a ransomware threat isn’t worth it

Ransomware victims willing to talk to the press sometimes suggest there is "honour among thieves" if they've been able to...

July 12th, 2016 Howard Solomon

14222 - Palo Alto Networks - Webinar Sept - SCADA_640x480(1)

Over 90 per cent of ICS devices exposed to Internet are vulnerable, says Kaspersky

There's no doubt that by now CISOs in organizations with industrial control systems (ICS) that connect to the Internet are...

July 11th, 2016 Howard Solomon