Do you know your MDM from MAM and EMM? It's all about BYOD, and how companies can keep data safe while making it easier for workers to be productive with their own devices.
The BlackBerry KeyOne packs in productivity features and is worth a look if you're in the market for a new phone. It's the first time BlackBerry's iconic keyboard has been paired with Android.
In the latest episode of Security Sessions, CSO Editor-in-Chief Joan Goodchild speaks via Skype with Michael A. Davis, the CTO of behavioral analytics company CounterTack. The two discuss why machine learning is so important to CSOs and CISOs, even if they themselves are not particularly investing in such technology for their own security systems.
Employees are often the weakest link in your company's security chain. But with a little knowledge and foresight you can mitigate the risks. In this video, CIO.com senior writer Sharon Florentine explains the anatomy of a phishing scam and how you and your workers can avoid becoming a victim.
CSO's Joan Goodchild and Steve Ragan discuss some of the latest security news, including how the FBI director inadvertently (or on purpose?) revealed his Twitter ID and what the new regulations regarding ISPs being able to sell your private data without your consent really entails.
In the latest episode of Security Sessions, CSO Editor-in-Chief Joan Goodchild sits down with Sanjay Raja from Lumeta, a network and performance monitoring company. The two discuss how CSOs and CISOs can get a handle on the explosion of new devices entering the network and how to make sure those devices are secured.
CSO Online's Steve Ragan and Joan Goodchild chat about the hot security news of the week, including their take on the recent WikiLeaks revelations around the CIA, and how Cisco, Samsung and Apple have responded to the information.
In the latest episode of Security Sessions, CSO Editor-in-Chief Joan Goodchild sits down with Jeff Fagnan from Accomplice, a venture capital and private equity firm in Cambridge, Mass. The two discuss the current state of VC funding in security companies and where the money is going (and not going), and why CSOs should "follow the money."
The U.S. Federal Bureau of Investigation has been investigating the intrusion for two years, but it was only in late 2016 that the full scale of the hack became apparent. On Wednesday, the FBI indicted four people for the attack, two of whom are Russian spies.
Matt Gangwer, CTO of Rook Security and Ryan O'Leary, VP of Threat Research Center and Tech Support at WhiteHat Security join CSO Online's Steve Ragan to talk about the evolution of ransomware, and what companies need to do to combat it.
TruStar's head of product, Shimon Modi, shows CSO Online's Steve Ragan how his company is changing the game when it comes to incident reporting for companies.
Chad Holmes, Principal of Ernst & Young LLP sits down with Network World's Neal Weinberg to talk about how cyber-robotics will help shape the future of cybersecurity.
At RSA 2017, CSO’s Steve Ragan chats with security expert Ira Winkler about where many security programs are failing within companies, as well as his concept of “advanced persistent security.”
At RSA 2017, Derek Manky, Global Security Strategist at Fortinet, talks about the mission and goals of the Cyber Threat Alliance, which shares malware information between members to improve defenses in the cybersecurity space.
At RSA 2017, security expert Konstantin Karagiannis (CTO at BT North America) gives Network World an overview of blockchain security and how it could help shape the future of cybersecurity.