5 steps to respond to a security breach
It’s not a matter of if you are going to fall victim to a cyber attack, it’s when. So what should you do to minimise the adverse consequences that can arise from a breach?
It’s not a matter of if you are going to fall victim to a cyber attack, it’s when. So what should you do to minimise the adverse consequences that can arise from a breach?
Is the CIO role in crisis? And are IT leaders doing enough to promote their personal brand?
The security of open source software relies on the community spotting errors -- but Heartbleed and other recent events suggest that that's not happening.
GE Capital has responded to media reports that financial websites run by GE Money could be vulnerable to the Heartbleed security bug by saying that it has “no reason” to believe any customer data has been compromised.
By and large, the major websites hit by Heartbleed have recovered. So have the bad guys, who are undoubtedly plotting their next move. Here, security experts offer their take on five large-scale, Heartbleed-level vulnerabilities for which CIOs should prepare.