
Six best practices for managing cyber alerts
Security professionals know that the number of cyber alerts is growing at a frantic pace. Even a mid-sized company can face tens of thousands of alerts every month. As the …

Irregular application testing: App security in healthcare
Nearly half (45%) of NHS trusts scan for application vulnerabilities just once a year, with less only 8% doing so on a daily basis, according to Veracode. This potentially …

Is it time to call an MSSP? Five signs that it can’t wait
Small and midsize businesses (SMBs) are fighting an uphill battle when it comes to managing their network security. According to a 2016 Ponemon study, 69 percent of SMBs don’t …

Half of IT pros don’t know how to improve their security posture
Mid-market enterprises have high confidence in their cybersecurity defenses, but they struggle to defend against malicious activity that has become more sophisticated and …

Most organizations are unaware of daily malicious activity
A new DomainTools survey of more than 550 security analysts, IT managers, and executives revealed that the majority of organizations are struggling to monitor and prevent …

Security budgets shifting from prevention to detection
According to industry estimates, enterprises have historically spent more than 75% of their infosec technology budgets on preventative technologies. According to a new survey …

Key cloud adoption trends and challenges for government entities
Cloud computing has become a trending topic for federal CIOs in the last few years, according to Netwrix. In response to the Obama administration’s cloud-first …

Security management outlook: Five trends to watch
Cybersecurity can’t sit still. As we look ahead to what this year has in store for the security management landscape, organizations globally should be paying attention to five …

Global data privacy laws: The #1 cross-border e-discovery challenge
In the year since the EU’s rejection of Safe Harbor, there has been a spike in legal concern over cross-border data transfers, according to a survey by BDO Consulting. Sixty …

Majority of SOCs are below optimal maturity levels
With increased pressure to rapidly innovate and align security initiatives with business goals, a SOC provides the foundation for how organizations protect their most …

The gift that keeps giving away your data
If you unwrapped a shiny, new connected device this holiday season, it’s likely that you’re in the honeymoon stage, reaping many benefits from your new device. However, this …

Top cyber concerns plaguing digital enterprises
69% of senior security and IT executives say digital transformation is forcing fundamental changes to existing cybersecurity strategies, according to BMC and Forbes Insights. …
Featured news
Resources
Don't miss
- CISA warns about actively exploited Broadcom, Commvault vulnerabilities
- Marks & Spencer cyber incident linked to ransomware group
- Eyes, ears, and now arms: IoT is alive
- What’s worth automating in cyber hygiene, and what’s not
- Want faster products and stronger trust? Build security in, not bolt it on