Please turn on your JavaScript for this page to function normally.
boardroom
How boardrooms are safeguarding digital assets

More than 90 percent of surveyed senior business leaders agree that strong technology governance contributes to improved business outcomes and increased agility, according to …

Business
The changing role of the Chief Information Officer

Digitalization and technological innovation are changing the nature of the job of the CIO. Leaders are rapidly scaling their digital businesses, making the remainder of this …

keys
PKI changes and uncertainty due to new applications

New research by the Ponemon Institute reveals the Internet of Things (IoT) is playing an increasingly important role in influencing public key infrastructure (PKI) planning …

DNS
Most companies are unprepared for DNS attacks

DNS security is often overlooked when it comes to cybersecurity strategy, with most companies inadequately prepared to defend against DNS attacks. Dimensional Research …

risk
Outdated vendor systems leaving finance industry at risk

BitSight data scientists found that in most cases, companies in the finance industry supply chain are not meeting the same security standards that finance companies hold for …

DJI drone
DJI launches privacy mode for drone operators

DJI launched a new Local Data Mode that stops internet traffic to and from its DJI Pilot app, in order to provide enhanced data privacy assurances for sensitive government and …

cybercrime
The global impact of huge cyber security events

The past 12 months have seen a number of unprecedented cyber-attacks in terms of their global scale, impact and rate of spread. Already causing widespread public concern, …

traffic
Protecting networks from DNS exfiltration

Everyone around the globe has heard about the colossal Equifax breach last month. Its implications haven’t yet been fully calculated except now that the CEO has resigned from …

tunnel light
How attackers can take advantage of encrypted tunnels

Many organizations are not actively examining the encrypted traffic in their network. According to a Venafi survey, roughly a quarter (23%) of security professionals don’t …

GDPR
How US and UK companies address GDPR data protection requirements

Data privacy is becoming more complex, companies are equally unprepared in both the UK and US to comply with GDPR by the May 2018 deadline, and US companies are investing more …

abstract
Gartner reveals the 2017 Hype Cycle for Data Management

As data becomes ever more distributed across multiple systems, organizations have to cope with increasingly complex ecosystems and digital business requirements. Hype Cycle …

people
Week in review: Deloitte hack, insecure Mac firmware, new issue of (IN)SECURE

Here’s an overview of some of last week’s most interesting news and articles: XPCTRA financial malware leaves no stone unturned A Trojan that has previously been …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools