• image
  • image
  • image
  • image
  • image
  • image

Data Security Begins With the Traveler

by Joe Sharkey | September 2, 2013 | nytimes.com

MY wife looked up from her iPad, where she was routinely reviewing a credit card statement.

Read more: Data Security Begins With the Traveler

Senior management do not understand security metrics as it is too technical

by SC Staff | July 11, 2013 | scmagazineuk.com

Half of IT professionals do not believe that their metrics adequately convey the effectiveness of security risk management efforts to senior executives.

Read more: Senior management do not understand security metrics as it is too technical

Physical Security Experts Must Understand Cybersecurity

by Colin Bodbyl | July 28, 2013 | ifsecglobal.com

Most physical security experts have not known much about cybersecurity. However, as physical security continues to merge with the IP world, cybersecurity training should be on the agenda for each and every one of us.

Read more: Physical Security Experts Must Understand Cybersecurity

How CIOs Should Talk to the Board About Security

by Deloitte | July 24, 2013 | wsj.com

The surge in high-profile data breaches and cyberattacks that have occurred over the past five years has prompted many corporate boards to begin asking pointed questions about their companies’ information security practices. They want to know: What are the odds our company will experience a damaging security breach, and what are we doing to prevent that from happening?

Read more: How CIOs Should Talk to the Board About Security

Employee Theft On the Rise and Expected to Get Worse

by Chad Brooks | June 19, 2013 | businessnewsdaily.com

Poor pre-employment screening and a decline in supervision are contributing to the rise in employee theft incidents, new research shows.

Read more: Employee Theft On the Rise and Expected to Get Worse

6 Steps to Secure Mobile Devices

by Eric Chabrow | June 25, 2013 | govinfosecurity.com

NIST's Revised Mobile Guidance Gets New Name for New Times

Read more: 6 Steps to Secure Mobile Devices

Security ROI: 5 Practices Analyzed

by Larry Ponemon | June 19, 2013 | informationweek.com

Which security practices bring the best return on investment? Not all of the most popular practices are good for your company.

Read more: Security ROI: 5 Practices Analyzed

Commercial, retail buildings to drive market for remote monitoring services in intelligent buildings

by SIW Editorial Staff | May 29, 2013 | securityinfowatch.com

According to a new report from IMS Research, part of IHS Inc., commercial and retail end users will help drive the growth of remote monitoring services in intelligent buildings, accounting for more than 80 percent of an estimated $400 million market in 2016.

Read more: Commercial, retail buildings to drive market for remote monitoring services in intelligent buildings