Is the U.S. Really the Weak Link? Raising Questions About the Value of Chip...
The U.S. has been slower at implementing chip and PIN because it has historically had relatively low fraud rates, due to a nearly 100-percent online authorization and sophisticated real-time fraud...
View ArticleRSA 2012 with Dr. Martin Hellman
While we were in San Francisco this year for RSA 2012 we spoke with Dr. Martin Hellman, Professor Emeritus at Stanford University, who was honored this week with a lifetime achievement award for his...
View ArticleGuest Post: Firewall Change Management: Achieving a Return on Automation
Looking at IT security through an ROI lens is a hard sell to make. That’s because you don’t really get credit for not having data lost/stolen or for not having a business disruption. Security is like...
View ArticlePartnership for Cyber Resilience to Help Protect the Global Digital Environment
Today’s hyper-connected world allows all of us to access the Internet from wherever we are, using any device we want. And, we do. With our computers, Smartphones, iPads or other devices, we have become...
View ArticleAssessing the Probability of Events: Apache Helicopter 1, Firewalls 0
Expect the unexpected is a good adage. In security it is also the best risk strategy, as evidenced recently, when a £45m Apache helicopter gunship hit a 132,000 Volt power line in Suffolk, causing...
View ArticleBusiness Continuity and Resilience Planning – How to Prepare for ‘Business...
By Jeff Schmidt, Executive Global Head of Business Continuity, Security & Governance, BT Global Services How many times a month do we hear on the news about product recalls — on everything from...
View ArticleCyber is Big Business, and a Big Opportunity for Thieves
Almost every week the media report on another serious security breach. No one is immune. The 2011 Norton Cybercrime Report estimates that cybercrime costs the global economy $338 billion a year and...
View ArticleCyber Zen
By Dr Robert Ghanea-Hercock, Chief Researcher, BT Security Research Practice Good cyber defence starts in the mind. It takes imagination and the ability to see events from a variety of perspectives....
View ArticleLegacy, security and BYOD
By Chris Pickles, Head of Industry Initiatives, BT Global Banking & Financial Markets A journalist down here in Johannesburg asked me today what I thought was holding back the adoption of BYOD...
View ArticleLifting the cloak of secrecy in IT security — the latest news from the world...
The White Hat professional holds a unique position in security — combining an in-depth knowledge of all forms of attack, (and even admiring the skill in the most destructive of code), with a strong bag...
View ArticleMaking security cool (and CFO-friendly) unlocks resources for your IT security
Jill Knesek, Head of Global Security — Professional Services with BT Global Services talks must-have tactics for winning CFO support and funding for your security essentials. It’s great to be in with...
View ArticleAnthills and cyber defence
By: Dr Robert Ghanea-Hercock, Chief Researcher, BT Security Research Practice I recently ventured into the jungle that is my back garden, at a request from my senior management (a.k.a. my wife). The...
View ArticleFast-tracking the CISO to board-influencer status
By Tara Savage, Security Marketing Manager, BT Latest results just in — only 25 per cent of Chief Information Security Officers (CISOs) can be classed as having a strategic influence over their board....
View ArticleSo you want to be an ethical hacker?
By Tara savage, Security Marketing Manager, BT Becoming a certified ethical hacker (also known as a white-hat hacker) is something most security professionals think about at one time or another during...
View ArticleA new identity in financial markets
Banks, brokers and market regulators around the world have always faced the challenge of identifying individual counterparties and customers. Within financial institutions, because of the siloed...
View ArticleMalicious content — only a click away
By Fadli Bin Sidek, Security Consultant, BT Last year, I wrote a technical article for PenTest Magazine entitled ‘Social Engineering — Pentesting the Human Element’ which focused on the process of...
View ArticleAnother great achievement: the CIO 100 Awards 2014
On 19 August, in the beautiful setting of the Terranea Resort in Rancho Palos Verdes, California, we were among 100 organisations recognised at the CIO 100 Symposium and Awards Ceremony as recipients...
View ArticlePartnership for Cyber Resilience to Help Protect the Global Digital Environment
Today’s hyper-connected world allows all of us to access the Internet from wherever we are, using any device we want. And, we do. With our computers, Smartphones, iPads or other devices, we have become...
View ArticleAssessing the Probability of Events: Apache Helicopter 1, Firewalls 0
Expect the unexpected is a good adage. In security it is also the best risk strategy, as evidenced recently, when a £45m Apache helicopter gunship hit a 132,000 Volt power line in Suffolk, causing...
View ArticleBusiness Continuity and Resilience Planning – How to Prepare for ‘Business...
By Jeff Schmidt, Executive Global Head of Business Continuity, Security & Governance, BT Global Services How many times a month do we hear on the news about product recalls — on everything from...
View Article
More Pages to Explore .....