Taylor Armerding

Contributing writer

Protection of white-hat hackers is slow in coming

Leadership: Going from dictator to enabler

Defeating highly adaptable cyber attackers takes the same kind of leadership it took to defeat highly adaptable terrorists in Iraq, according to Ret. Gen. Stanley McChrystal: Enabling the expertise within the organization.

Taking down the internet: Possible, but how probable?

Taking down the internet: Possible, but how probable?

Security guru Bruce Schneier reported recently that the companies that maintain the “backbone” of the internet have been under increasing attacks designed to test their defenses. It’s the kind of thing, he said, that could mean an...

On the hunt for merger or acquisition? Make sure your target is secure

On the hunt for merger or acquisition? Make sure your target is secure

Security experts and regulators have been warning companies in recent years that it is not enough to be secure themselves – that the security posture of their vendors and other third parties is just as important. That message has been...

Tracking is no longer just on the rails for Boston's MBTA

Tracking is no longer just on the rails for Boston's MBTA

The pitch from the company launching a beacon tracking system for Boston’s MBTA system is that it will show how, “technology can enable citizens to have more unique, tailored experiences with both cities and brands.” Privacy experts...

Why have most merchants missed the EMV deadline?

Why have most merchants missed the EMV deadline?

The shift to EMV or “chip-and-PIN” credit-card technology is seen as a way to make a major dent in fraud. But a large majority of merchants missed last week’s Oct. 1 deadline to update their payment terminals. Merchant advocates say...

How to ace the CISO interview: Be ready for the tough questions

How to ace the CISO interview: Be ready for the tough questions

The final hurdle to top information security jobs is the interview, or as one executive put it, “interviews” -- as many as a dozen. Successful candidates have to be prepared for the questions that are designed to see if they can be a...

Security experts: Cyber sharing isn't enough

Security experts: Cyber sharing isn't enough

Most experts at a Johns Hopkins University conference on cyber threat sharing said that while it's a useful tool, government officials should focus on stronger online security.

CSOs aren’t waiting for cyber sharing legislation

CSOs aren’t waiting for cyber sharing legislation

While legislation to promote, and govern, the sharing of cyber threat information between the private and public sector remains stalled in Congress, many IT leaders say while they would welcome a bit more sharing from the government,...

Can training transform CISOs into business leaders?

Can training transform CISOs into business leaders?

Chief information security officers have for years been held in low regard in the C-suite. But there are efforts under way to transform them into business strategists as well as technologists.

Blackmail rising from Ashley Madison breach

Blackmail rising from Ashley Madison breach

Online extortion and blackmail are not new concepts. But the recent hack of adultery website Ashley Madison shows there is money to be made in threats of personal embarrassment.

Your router: Gateway for hackers

Your router: Gateway for hackers

The router has been called the 'backbone of the Internet.' If that is the case, it is a broken backbone, according to security experts, who say they are dangerously vulnerable, and there is currently no way to upgrade or patch most of...

Load More