Taylor Armerding

Protection of white-hat hackers is slow in coming

Leadership: Going from dictator to enabler

Leadership: Going from dictator to enabler

Defeating highly adaptable cyber attackers takes the same kind of leadership it took to defeat highly adaptable terrorists in Iraq, according to Ret. Gen. Stanley McChrystal: Enabling the expertise within the organization.

Taking down the internet: Possible, but how probable?

Taking down the internet: Possible, but how probable?

Security guru Bruce Schneier reported recently that the companies that maintain the “backbone” of the internet have been under increasing attacks designed to test their defenses. It’s the kind of thing, he said, that could mean an...

Tracking is no longer just on the rails for Boston's MBTA

Tracking is no longer just on the rails for Boston's MBTA

The pitch from the company launching a beacon tracking system for Boston’s MBTA system is that it will show how, “technology can enable citizens to have more unique, tailored experiences with both cities and brands.” Privacy experts...

How to ace the CISO interview: Be ready for the tough questions

How to ace the CISO interview: Be ready for the tough questions

The final hurdle to top information security jobs is the interview, or as one executive put it, “interviews” -- as many as a dozen. Successful candidates have to be prepared for the questions that are designed to see if they can be a...

Security experts: Cyber sharing isn't enough

Security experts: Cyber sharing isn't enough

Most experts at a Johns Hopkins University conference on cyber threat sharing said that while it's a useful tool, government officials should focus on stronger online security.

When stolen data can ‘phone home’

When stolen data can ‘phone home’

While it is impossible to prevent all data breaches, digital watermarking of sensitive data can let organizations know immediately not only if it has been stolen, but where and how it is being accessed. That's a lot better than the...

Securing the ‘Net – at what price?

Securing the ‘Net – at what price?

In an open letter to President Obama, one security expert contends that Internet security could come close to 100% for $4 billion. Fellow experts agree that massive improvement is possible - for considerably less than $4 billion - but...

Cybercrime: Much more organized

Cybercrime: Much more organized

Estimates vary on how deeply organized crime has penetrated the world of cybercrime, but most experts agree that it is on the rise. How best to counter it is still a matter of discussion. Some are behind President Obama's call for...

Open source: Big benefits, big flaws

Open source: Big benefits, big flaws

Open source code is popular for good reasons: It is free, it is open, it can easily be customized to fit the needs of a developer or organization, and there is a "community" of participants who are able to spot flaws or other...

Breach costs: ‘Chump change’ to bottom lines of big players

Breach costs: ‘Chump change’ to bottom lines of big players

The general view of data breaches is that their costs to organizations can range from significant to catastrophic. But according to some reports, it is little more than a minor annoyance to the biggest players in the market - small...

Caught in the breach: How a good CSO confronts inevitable bad news

Caught in the breach: How a good CSO confronts inevitable bad news

There are ways to make it much more difficult for attackers to breach an organization. But some of them are inevitable. The mindset of a good CSO must be on how to detect and respond quickly, to limit the damage once the inevitable...

Load More