
A closer look at hybrid cloud security challenges
Most enterprises face major challenges when managing security across their hybrid enterprise networks both during and after cloud migrations, according to AlgoSec. The …

The clock is ticking on GDPR: Is your business ready?
Despite having almost two years to prepare for the General Data Protection Regulation (GDPR), there are companies across the globe that have done little, if anything, to avoid …

Higher education CIOs expect business model change due to digital transformation
Higher education CIOs recognize that key organizational priorities are enrollment and student success, but fail to show innovation with regard to the top technologies required …

Chris Eng: An infosec journey from offense to defense
“Come to my lab, I promise you’ll learn something cool,” a friend told Chris Eng. Within a couple of hours, he had walked him through writing an exploit for …

Can an international cyber convention ever succeed?
The Cold War is a distant memory for most, but today we see a new struggle for dominance on the global stage – with cyber weapons being the latest focal point. The advance of …

Top threats impacting endpoint security decisions
Enterprise Strategy Group surveyed 300 IT and information security professionals from large midmarket and enterprise-class organizations in order to examine the top threats …

Data-driven analysis of vulnerabilities in real-world OT networks
Operational Technology (OT) networks are ripe targets for adversaries, whose motives range from criminal intent to operational disruption and even threats to human and …

Cloud security today: Complexity, compliance, and containerization
An new report by Threat Stack and ESG sheds light on the security and business challenges that accompany the growth of public cloud environments and containers. Overall, the …

Immersive technologies are game changers for cybersecurity job growth
A new ESG study, which surveyed more than 500 people aged 16 to 24, revealed that 74% of respondents said the use of VR tools would increase their likelihood of pursuing …

The impact of threat hunting on your security operations
The main goal of threat hunting is to find traces attackers have left behind in the organization’s IT environment. These traces can date back to already solved crises or …

The 10 misconceptions of using a policy-based approach for access control
The principle of Attribute Based Access Control (ABAC) has existed for many years. It’s the evolution from simple access control lists and role-based access control, to a …

Infosec shouldn’t eat their own, we’re better than this
Security teams the world around are putting in hours every day to keep their company’s most prized assets secure. These are professionals that have spent considerable time …