Quantcast
Channel: CIO – Let's Talk Security
Browsing all 36 articles
Browse latest View live

Is the U.S. Really the Weak Link? Raising Questions About the Value of Chip...

The U.S. has been slower at implementing chip and PIN because it has historically had relatively low fraud rates, due to a nearly 100-percent online authorization and sophisticated real-time fraud...

View Article



RSA 2012 with Dr. Martin Hellman

While we were in San Francisco this year for RSA 2012 we spoke with Dr. Martin Hellman, Professor Emeritus at Stanford University, who was honored this week with a lifetime achievement award for his...

View Article

Guest Post: Firewall Change Management: Achieving a Return on Automation

Looking at IT security through an ROI lens is a hard sell to make. That’s because you don’t really get credit for not having data lost/stolen or for not having a business disruption.  Security is like...

View Article

Partnership for Cyber Resilience to Help Protect the Global Digital Environment

Today’s hyper-connected world allows all of us to access the Internet from wherever we are, using any device we want. And, we do. With our computers, Smartphones, iPads or other devices, we have become...

View Article

Assessing the Probability of Events: Apache Helicopter 1, Firewalls 0

Expect the unexpected is a good adage. In security it is also the best risk strategy, as evidenced recently, when a £45m Apache helicopter gunship hit a 132,000 Volt power line in Suffolk, causing...

View Article


Business Continuity and Resilience Planning – How to Prepare for ‘Business...

By Jeff Schmidt, Executive Global Head of Business Continuity, Security & Governance, BT Global Services How many times a month do we hear on the news about product recalls — on everything from...

View Article

Cyber is Big Business, and a Big Opportunity for Thieves

Almost every week the media report on another serious security breach. No one is immune. The 2011 Norton Cybercrime Report estimates that cybercrime costs the global economy $338 billion a year and...

View Article

Image may be NSFW.
Clik here to view.

Cyber Zen

By Dr Robert Ghanea-Hercock, Chief Researcher, BT Security Research Practice Good cyber defence starts in the mind. It takes imagination and the ability to see events from a variety of perspectives....

View Article


Legacy, security and BYOD

By Chris Pickles, Head of Industry Initiatives, BT Global Banking & Financial Markets A journalist down here in Johannesburg asked me today what I thought was holding back the adoption of BYOD...

View Article


Lifting the cloak of secrecy in IT security — the latest news from the world...

The White Hat professional holds a unique position in security — combining an in-depth knowledge of all forms of attack, (and even admiring the skill in the most destructive of code), with a strong bag...

View Article

Making security cool (and CFO-friendly) unlocks resources for your IT security

Jill Knesek, Head of Global Security — Professional Services with BT Global Services talks must-have tactics for winning CFO support and funding for your security essentials.  It’s great to be in with...

View Article

Anthills and cyber defence

By: Dr Robert Ghanea-Hercock, Chief Researcher, BT Security Research Practice I recently ventured into the jungle that is my back garden, at a request from my senior management (a.k.a. my wife). The...

View Article

Fast-tracking the CISO to board-influencer status

By Tara Savage, Security Marketing Manager, BT Latest results just in — only 25 per cent of Chief Information Security Officers (CISOs) can be classed as having a strategic influence over their board....

View Article


Image may be NSFW.
Clik here to view.

So you want to be an ethical hacker?

By Tara savage, Security Marketing Manager, BT Becoming a certified ethical hacker (also known as a white-hat hacker) is something most security professionals think about at one time or another during...

View Article

Image may be NSFW.
Clik here to view.

A new identity in financial markets

Banks, brokers and market regulators around the world have always faced the challenge of identifying individual counterparties and customers. Within financial institutions, because of the siloed...

View Article


Image may be NSFW.
Clik here to view.

Malicious content — only a click away

By Fadli Bin Sidek, Security Consultant, BT Last year, I wrote a technical article for PenTest Magazine entitled ‘Social Engineering — Pentesting the Human Element’ which focused on the process of...

View Article

Image may be NSFW.
Clik here to view.

Another great achievement: the CIO 100 Awards 2014

On 19 August, in the beautiful setting of the Terranea Resort in Rancho Palos Verdes, California, we were among 100 organisations recognised at the CIO 100 Symposium and Awards Ceremony as recipients...

View Article


Partnership for Cyber Resilience to Help Protect the Global Digital Environment

Today’s hyper-connected world allows all of us to access the Internet from wherever we are, using any device we want. And, we do. With our computers, Smartphones, iPads or other devices, we have become...

View Article

Assessing the Probability of Events: Apache Helicopter 1, Firewalls 0

Expect the unexpected is a good adage. In security it is also the best risk strategy, as evidenced recently, when a £45m Apache helicopter gunship hit a 132,000 Volt power line in Suffolk, causing...

View Article

Business Continuity and Resilience Planning – How to Prepare for ‘Business...

By Jeff Schmidt, Executive Global Head of Business Continuity, Security & Governance, BT Global Services How many times a month do we hear on the news about product recalls — on everything from...

View Article
Browsing all 36 articles
Browse latest View live




Latest Images