Taylor Armerding

Contributing writer

Protection of white-hat hackers is slow in coming

Leadership: Going from dictator to enabler

Leadership: Going from dictator to enabler

Defeating highly adaptable cyber attackers takes the same kind of leadership it took to defeat highly adaptable terrorists in Iraq, according to Ret. Gen. Stanley McChrystal: Enabling the expertise within the organization.

Taking down the internet: Possible, but how probable?

Taking down the internet: Possible, but how probable?

Security guru Bruce Schneier reported recently that the companies that maintain the “backbone” of the internet have been under increasing attacks designed to test their defenses. It’s the kind of thing, he said, that could mean an...

Je wachtwoord veranderen is schijnveiligheid

We leven nog in de jaren 90. Hou toch eens op!

Is privacy dood, of vinden we het opnieuw uit?

De meningen verschillen.

Terughacken brengt je alleen maar in meer problemen

Het antwoord op economische diefstal door hackers laat op zich wachten.

On the hunt for merger or acquisition? Make sure your target is secure

On the hunt for merger or acquisition? Make sure your target is secure

Security experts and regulators have been warning companies in recent years that it is not enough to be secure themselves – that the security posture of their vendors and other third parties is just as important. That message has been...

Tracking is no longer just on the rails for Boston's MBTA

Tracking is no longer just on the rails for Boston's MBTA

The pitch from the company launching a beacon tracking system for Boston’s MBTA system is that it will show how, “technology can enable citizens to have more unique, tailored experiences with both cities and brands.” Privacy experts...

Why have most merchants missed the EMV deadline?

Why have most merchants missed the EMV deadline?

The shift to EMV or “chip-and-PIN” credit-card technology is seen as a way to make a major dent in fraud. But a large majority of merchants missed last week’s Oct. 1 deadline to update their payment terminals. Merchant advocates say...

How to ace the CISO interview: Be ready for the tough questions

How to ace the CISO interview: Be ready for the tough questions

The final hurdle to top information security jobs is the interview, or as one executive put it, “interviews” -- as many as a dozen. Successful candidates have to be prepared for the questions that are designed to see if they can be a...

Security experts: Cyber sharing isn't enough

Security experts: Cyber sharing isn't enough

Most experts at a Johns Hopkins University conference on cyber threat sharing said that while it's a useful tool, government officials should focus on stronger online security.

CSOs aren’t waiting for cyber sharing legislation

CSOs aren’t waiting for cyber sharing legislation

While legislation to promote, and govern, the sharing of cyber threat information between the private and public sector remains stalled in Congress, many IT leaders say while they would welcome a bit more sharing from the government,...

Load More