Brendan Hannigan became IBM's top security systems executive in 2011, when Big Blue acquired the company he ran, Q1 Labs. Hannigan says acquisitions will remain a key component in the growth of IBM's security business.
Advanced threats, targeted attacks and enterprise mobility have re-shaped how we approach security, and they've also influenced the growth of FireEye. CEO David DeWalt discusses the highs and lows of his tenure.
BYOD is evolving into the "BYO-everything" trend, says Chris Clark, president of IBM's Fiberlink. He discusses Apple and IBM's enterprise mobility deal, as well as how mobility continues to reshape computing.
"It's a tough conversation, telling [clients] they've spent a lot of money on defense-in-depth that isn't working," says FireEye CEO David DeWalt. "If they don't change, they're risking their company."
Poor post-breach communication can cause as much damage to a company's reputation as the cyber-incident itself, says Al Pascual, a senior analyst at Javelin Strategy & Research, who will speak at ISMG's Fraud Summit Dallas.
Troy Leach of the PCI Security Standards Council says log monitoring is an effective data breach detection tool that, unfortunately, not enough merchants put to use. He explains how upcoming PCI guidance could help with implementation.
After 20 years in the Army and nearly that long as an information risk management leader at the National Institute of Standards and Technology, Ron Ross says his career is still evolving. Find out what he plans to do next.
Amy McHugh, a former FDIC IT examination analyst, says banking regulators will soon scrutinize C-level executives and boards of directors to gauge their cybersecurity awareness in the wake of the FFIEC's pilot cyber-risk assessment program.
Most citizens rightly don't trust the Internet as a voting booth. But the Atlantic Council's Jason Healey says that could change, not because of better security, but because the digital generation might demand it as they age.
Many issuers of chip-based credit cards will likely allow U.S. consumers to complete transactions with a signature, not a PIN, which will limit the fraud protections offered by EMV cards, says Citizen Financial Group's Tim Webb.
As numerous attacks have demonstrated, two-factor authentication systems are not foolproof, says Ryan Lackey, a principal in the security practice at CloudFlare, who offers insights on how today's authentication systems must evolve.