Please turn on your JavaScript for this page to function normally.
hands
The role of trust in security: Building relationships with management and employees

Massive data breaches have become the new reality, and they confirm that one of the biggest challenges companies face when it comes to security: a company’s biggest …

businessman
CISOs are feeling less confident than ever about cyber risk and data security

Chief Information Security Officers are feeling less confident than ever about cyber-risk and data security this year, according to a survey conducted by Ponemon Institute in …

network
Continuous security: What’s in a name?

DevOps has changed the lives of programmers everywhere for the better. Giving engineering teams operational responsibility drives more robust offerings and better automation. …

geometry
Cybersecurity in 2018: Three predictions and one hope

Effective cybersecurity means keeping a close eye on the threats you currently face, and an even closer eye on the threats to come. As you consider your security strategy and …

time
Security pros waste 10 hours a week due to inefficient systems

Process and software inefficiencies play a major role in slowing down an organization’s ability to detect and respond to cyber threats, according to LogRhythm. Over one-third …

network
To protect your network, you must first know your network

A sobering statistic regarding commonly used security controls was highlighted in a recent report. “Software and hardware inventory and valuation” was the least …

Richard Ford, Chief Scientist at Forcepoint
Richard Ford: A physicist’s strange journey to become an infosec scientist

Many of today’s information security professionals started their path towards a career in the industry by becoming frustrated gamers. Richard Ford, Chief Scientist at …

question
Six data security questions that every board needs to ask

As data breaches become a constant headline, data security should be a major concern for company boards everywhere. Unless a board member has been hired specifically to …

up
Is trading resilience for business growth a smart strategy?

Not long ago, the probability of a threat materializing was enough to open the IT pocketbook. Today, the mentality has shifted from one of risk prevention to one of risk …

cloud
Cloud security today: Complexity, compliance, and containerization

An new report by Threat Stack and ESG sheds light on the security and business challenges that accompany the growth of public cloud environments and containers. Overall, the …

Door
Sophisticated threats? It’s usually the basic ones that get you

To listen to the headlines, the threats we face today are so sophisticated and intense, they can only be evaded with the help of artificial intelligence and machine learning. …

businessman
The evolving nature of the CISO role

As IT security increasingly becomes a priority, CISOs’ influence within companies is growing. However, security strategy in many organizations is still largely reactive and …

Don't miss

Cybersecurity news