4 tips to make use of Wannacry in awareness programs
When security events make news, you can take advantage of the wake-up call — if you know what to do.
When security events make news, you can take advantage of the wake-up call — if you know what to do.
Action items for CSOs looking to bolster their security awareness programs.
Many experts say that people are more important than process in the IT security world. That is politically correct, as opposed to actually correct.
Just when the world seems ready to listen to us, we give it a display of epic bickering.
Pokemon Go represents a tremendous security threat. As with all tremendous threats, it can also be your greatest opportunity.
Security professionals should look in the mirror, before declaring a user, “stupid”.
The truth behind the hype and misunderstandings surrounding the case.
Ira Winkler questions a recent column on the topic of shoulder surfing, also called visual hacking, and suggests that a better understanding of security awareness would go a long way.
The outrage is more about media hype, hypocrisy and grandstanding than firm principles.
If you are in the security profession long enough, you realize that security policies are generally a pendulum that you have to live with. While the recent Wikileaks incident will cause information sharing within the Department of Defense and US Government as a whole to swing back the other way, you can bet that in a few years, it will swing back to wholesale information sharing again. Like many aspects of the world, security practices are--unfortunately--driven by the most recent events.