Maybe not, says Twitter’s former CISO, but there are risks with Facebook's move from a centralized to a distributed security model in the wake of Alex Stamos's departure.
Chief security officers should play a key role in building trust with customers, and that translates to better customer acquisition, greater customer loyalty, and more revenue.
Cisco says integration of its network, device and cloud security platforms with Duo Security’s zero-trust authentication and access products will let customers quickly secure users to any application on any networked device.
Take full advantage of white-hat hackers to help you secure your code. And still do all the other security stuff you should do before you release your code
Think you know your malware? Here's a refresher to make sure you know what you're talking about — with basic advice for finding and removing malware when you've been hit
Healthcare data is now more valuable to cyber crooks than credit card or social security numbers and criminals will go the extra mile to obtain it, according to Singapore-based security consultant, Olli Jarva.
Despite all the noise from security vendors, most hackers and pentesters can worm into a network and exfiltrate valuable data in under a day, including for critical systems, according to a recent report from Nuix.
As big tech vendors roll out a variety of blockchain-as-a-service offerings, two smartphone makers plan to include it new devices this year. Here's the latest on the blockchain craze.
Ian Jones describes corporate social responsibility funding as a ‘grudging obligation’ that, as it currently stands, achieves very little apart from being an exercise in good PR.
From CIoTO to automation architect, new IT roles are rising to fill emerging needs. Some may fizzle, but others may have a long future thanks to underlying IT trends.