Average business spends $15 million battling cybercrime
The average U.S. company of 1,000 employees or more spends $15 million a year battling cybercrime, up 20 percent compared to last year, according to a report released today.Attacks involving malicious...
View ArticleMcAfee plans to be elected president in a landslide on the backs of 40...
It has been a whirlwind few years for John McAfee, the man noted for developing the first commercial anti-virus program. It was only a few years ago when rumors were frantically flying around in...
View ArticleWhat will the CISOs of 2020 look like?
Ever since its inception in the late 1990s, the CISO job has tended to be a very technical job. The CISO would likely report to the CIO and have a varied background as a system or network...
View ArticleSurvey says enterprises are stepping up their security game
If all you read are all of the headlines (and there are too many, to be sure) you’d be convinced enterprises are losing the never-ending battle to secure their networks. Perhaps they are. And to help...
View ArticleDonald Trump is silent on cybersecurity
We’ve been covering the Republican candidates and where they stand on cybersecurity - beginning with Jeb Bush two weeks ago, and Carly Fiorina last week. This week we report on Donald Trump - except...
View ArticleStop focusing on gaps to gain influence as a security leader
How many gaps are you addressing in your environment?I read headlines and listen to stories about all sorts of gaps. Talent gaps. Breach gaps. Detection gaps. Response gaps. The list is long. It seems...
View ArticleIDG Contributor Network: Getting your Information Security team right
Companies are investing in cybersecurity more than ever and it is a critical and yet a difficult task to bring a team that effectively monitors threats and manages security incidents. Despite the...
View ArticleJohn McAfee on the Cyber Party platform
In this segment of The Irari Report interview with security icon and presidential candidate John McAfee, Ira Winkler and Araceli Treu Gomes ask McAfee about the political party that he formed, The...
View ArticlePardon all marijuana offenders: John McAfee Day One as President
In this segment of The Irari Report interview with security icon and presidential candidate, John McAfee, Ira Winkler and Araceli Treu Gomes ask McAfee about his plans for his first year as President...
View ArticleChinese, Russian hackers to receive roundhouse kicks from a cybersecurity...
Chuck Norris once said "There are few problems in this world that cannot be solved by a swift roundhouse kick to the face. In fact, there are none." He was referring to the sudden and devastating...
View ArticleIDG Contributor Network: What it takes to be a successful CISO
Recently, a terrific story on CSO Magazine online was published by Tayler Armerding that highlighted how CISOs are seen in such a poor light given a recent ThreatTrack report that surveyed 203 C-Suite...
View ArticleBoards are getting more involved in cybersecurity, but is it enough?
An escalation in the frequency, severity and impact of cybersecurity attacks damaging corporate operations, finances and reputations is forcing boards of directors to take more active roles in their...
View ArticleThe support security leaders need for better cloud security
How are your efforts to align with the business and migrate to the cloud going? What role is security playing?Many security leaders are struggling to find the path to a more secure cloud. That's why...
View ArticleThe security talent shortage and your leadership opportunity
Reframing the talent shortageImage by Steven Guzzardi“Identify your problems, but give your power and energy to solutions.” -- Tony RobbinsMuch is written about a talent shortage in the security...
View ArticleReport: Infosec women make progress in governance, risk and compliance
Women account for just 10 percent of the information security workforce, a new report shows, but are making progress in governance, risk and compliance jobs.The absolute number of women in...
View ArticleIDG Contributor Network: Compliant does not equal protected: our false sense...
It is no surprise that cybersecurity threats have risen to the top of the list of concerns for IT staff and even members of the C-Suite. With each new wave of breach incidents, lawmakers and...
View ArticleSnowden espouses about data ethics and privacy
Annandale-on-Hudson, N.Y. -- In the aftermath of Edward Snowden’s controversial leaks that revealed widespread US surveillance and data gathering, researchers, scholars, lawyers, and privacy...
View ArticleJohn McAfee's Cyber Security Doctrine
John McAfee is the first and only U.S. Presidential candidate to present the American people with a Cyber Security Doctrine. Who's crazier than John McAfee? Could be the Commander-In-Chief candidates...
View ArticleSecurity tech company employees are stingy in contributing to Presidential race
Financial supportImage by ThinkstockThe campaign finance reports filed with the Federal Elections Commission reveal that employees from security technology companies have not been feeling charitable...
View ArticleDoes the evidence really prove people are the weakest link?
“People are the weakest link in security.”Have you ever said that? It gets repeated in presentations, blog posts, and training all the time. It captures headlines. We even gather evidence and...
View Article
More Pages to Explore .....