Why Conquering Complexity Is a Critical Component of an Effective Security Program

Why Conquering Complexity Is a Critical Component of an Effective Security Program

Security professionals tend to have a penchant for making things more complicated than they need to be. But life and our work are complicated enough without us adding extra layers of needless complexity. When it comes to operating an effective enterprise security program, the old adage of “complexity being the enemy of security” really does [...]

Why Cars Are Increasingly Vulnerable to Cyber Attack

Why Cars Are Increasingly Vulnerable to Cyber Attack

Adrian Davis, Managing Director, EMEA at (ISC)² explains how we can stop the ongoing proliferation of vulnerabilities in connected cars It’s clear that we are rapidly moving towards turning cars into rolling internet browsers, connecting to everything from traffic lights to household appliances. Future vehicles will get remote updates on traffic jams or weather, automatically alert [...]

Tech Docs: Introducing the New Palo Alto Networks Compatibility Matrix

Tech Docs: Introducing the New Palo Alto Networks Compatibility Matrix

The Tech Docs team just rolled out the new Palo Alto Networks Compatibility Matrix (PDF). We produced this document to address feedback about the “findability” of compatibility and support information for our various next-generation security devices. The new central Compatibility Matrix covers different compatibility and interoperability considerations for Palo Alto Networks devices. For example, it [...]

CSA’s Big Data Working Group seeking new Co-chairs to develop and maintain Research Portfolio

CSA’s Big Data Working Group seeking new Co-chairs to develop and maintain Research Portfolio

The Cloud Security Alliance’s Big Data Working Group is seeking new co-chairs to develop and maintain a research portfolio providing capabilities to lead the crystallization of best practices for security and privacy in big data, help industry and government on adoption of best practices, establish liaisons with other organizations in order to coordinate the development [...]