Please turn on your JavaScript for this page to function normally.
architecture
SIEM challenges: Why your security team isn’t receiving valuable insights

Today, many enterprises use security information and event management (SIEM) software to help detect suspicious activity on their networks. However, to be effective …

GDPR
Integrating GDPR into your day to day IT practices

GDPR, four letters that when combined strike fear into the heart of any sysadmin. Luckily, there is quite some time before it comes into force, which means getting into the …

bridge
What’s needed for the first NYS DFS cybersecurity transitional phase?

The first transitional phase of the New York State’s Department of Financial Services (NYS DFS) cybersecurity regulation is upon us. As of August 28th, 2017 covered entities …

locks
Disturbing lack of cyber attack awareness among directors

Britain’s top firms and charities urgently need to do more to protect themselves from online threats, according to new government research and a ‘cyber health check’. One in …

Qualys
Why you need to implement security controls across your environment

In this podcast recorded at Black Hat USA 2017, Tim White, Director of Product Management, Policy Compliance at Qualys, discusses the importance of security configuration …

building
STIX and TAXII: Sharing cyber threat intelligence

In this podcast recorded at Black Hat USA 2017, Allan Thomson, CTO at LookingGlass Cyber Solutions, talks about STIX and TAXII. STIX (Structured Threat Information Expression) …

London
New UK data protection law to offer more control to users

UK citizens will have more control over how their personal information is used by businesses, and the right to demand from social media companies and online traders the …

cloud
Where does corporate cloud security responsibility begin and service provider responsibility end?

Security has, is and will continue to be the cornerstone of advancement in the digital age. Conditions of trust, real or expected, are essential for digital economies to grow …

GDPR
Only 2% of “GDPR-ready” organizations are actually compliant

Only nine percent of UK organizations that believe they are prepared for the General Data Protection Regulation (GDPR) actually are, new research from Veritas has found. In …

GDPR
As GDPR approaches, retail data breaches remain unacceptably high

Two in five retailers across the globe have experienced a data breach in the past year, according to Thales and 451 Research. The report reveals that 43 percent of retailers …

IBM Z
IBM reboots iconic mainframe: Encrypt data all the time, at any scale

IBM today unveiled IBM Z, the next generation of a transaction system capable of running more than 12 billion encrypted transactions per day. The new system also introduces an …

100
Constant availability: Mission-critical business data challenges

In today’s world, consumers expect businesses to be always-on, but 24/7/365 availability – for both data and applications – comes with specific information …

Don't miss

Cybersecurity news