Antivirus and intrusion detection software have come under fire lately, but they're still important in securing cyber systems.
A recent survey suggests CEOs and CISOs don't speak the same language. Maybe it's time for government to set some generally accepted standards for information security.
The continued presence -- and exploitation -- of known vulnerabilities suggests that some executives have decided that installing software patches is not worth the effort.
If more people own a cell phone than a toothbrush, someone is missing their big break.
Vito Corleone had an elegant solution to identifying the source of clandestine attacks.
DARPA's "active authentication" would be a welcome alternative to passwords and other cumbersome credentials.
The term advanced persistent threat has become a buzzword that many security pros prefer to avoid, but it remains a useful description of a serious threat.
The take-down of an Internet fraud ring went down as planned, but inadequate public outreach left millions of computers at risk.
When we give up ownership of information and resources in favor of anywhere, any-device access, we risk trading down on security in the process.
As if we didn't have enough to be afraid of, now there's nomophobia – the fear of being out of cell phone contact.
The telecom industry's insistence that all regulation is bad for security does a disservice to those who rely on critical infrastructure.
In a study on cybersecurity attitudes, one-third of security officials rated computer security higher than missile defense.
In the cybersecurity world, the military model of mitigating damage when operating in degraded conditions is increasingly applicable.
The no-regulation stance of Senate Republicans opposing the new cybersecurity bill lessens the chance of getting meaningful legislation passed.
The Deploy360 site is an online resource for information on two transformative technologies being implemented globally on the Internet.