Security breach exposes iPad users
SAN FRANCISCO — AT&T Inc. yesterday acknowledged a security weak spot that exposed the e-mail addresses of apparently more than 100,000 users of Apple Inc.’s iPad, a breach that could make those...
View ArticleCybercrimes: It is a long road between right and resolution
By BECKY GILLETTE There are potential criminal and civil liabilities for hackers who compromise trade secrets, customer names and credit card information from a business. But finding the hackers,...
View ArticleWESLEY McGREW — Being a “compliant” victim of cybercrime
When I discuss cybersecurity with business leaders, the most common misconception I see involves the role of security compliance. In my last column, I described the reality of cybercrime, a wild...
View ArticleWESLEY McGREW: An Internet of hackable ‘things’ threatens your business
In this column, I try to avoid “buzz words” and jargon. Information security is complex enough without them. The security industry is overrun with companies that intend to confuse you with marketing...
View ArticleWESLEY McGREW: Cyber security for the road warrior
In my previous columns, I’ve been describing the benefits of having offense-oriented testing performed on your company’s network. This time around, I want to give some advice for the road warriors...
View ArticleFOCUS ON SECURITY: Ransomware can paralyze a business
By BECKY GILLETTE Ransomware can not only leave a business paralyzed with no access to its computer system, it can be extremely costly. The amount of ransom demanded has been on the rise over the past...
View ArticleSecurity breach exposes iPad users
SAN FRANCISCO — AT&T Inc. yesterday acknowledged a security weak spot that exposed the e-mail addresses of apparently more than 100,000 users of Apple Inc.’s iPad, a breach that could make those...
View ArticleCybercrimes: It is a long road between right and resolution
By BECKY GILLETTE There are potential criminal and civil liabilities for hackers who compromise trade secrets, customer names and credit card information from a business. But finding the hackers,...
View ArticleWESLEY McGREW — Being a “compliant” victim of cybercrime
When I discuss cybersecurity with business leaders, the most common misconception I see involves the role of security compliance. In my last column, I described the reality of cybercrime, a wild...
View ArticleWESLEY McGREW: An Internet of hackable ‘things’ threatens your business
In this column, I try to avoid “buzz words” and jargon. Information security is complex enough without them. The security industry is overrun with companies that intend to confuse you with marketing...
View ArticleWESLEY McGREW: Cyber security for the road warrior
In my previous columns, I’ve been describing the benefits of having offense-oriented testing performed on your company’s network. This time around, I want to give some advice for the road warriors...
View ArticleFOCUS ON SECURITY: Ransomware can paralyze a business
By BECKY GILLETTE Ransomware can not only leave a business paralyzed with no access to its computer system, it can be extremely costly. The amount of ransom demanded has been on the rise over the past...
View Article
More Pages to Explore .....