
Ransom is the main motivation behind cyber attacks
49% of businesses confirmed being the subject of a ransom campaign in 2016, according to Radware. What’s more, 27% of IT professionals surveyed chose data leakage or loss as a …

New security concerns due to business complexities
It is estimated that in 2016, more than $94 billion will be invested in security solutions, per industry analyst forecasts, yet nearly half of organizations report having had …

Will 2017 be the year of ransomworm?
It’s safe to say that 2016 was the year of ransomware. More specifically, the year of crypto-ransomware, that nefarious variant that encrypts files and holds them captive …

Top obstacles and benefits of security framework adoption
95 percent of organizations face significant challenges when implementing leading cybersecurity frameworks, according to Tenable Network Security and the Center for Internet …

IoT Trust Framework: The foundation for future IoT certification programs
The Online Trust Alliance (OTA) released its updated IoT Trust Framework. Serving as a product development and risk assessment guide for developers, purchasers and retailers …

Mitigating internal risk: Three steps to educate employees
IT security is usually focused on how to prevent outsiders with malicious intent from causing harm to your IT systems and data. While this is a valid concern, people within …

Playing the blame game: Breaking down cybersecurity attribution
Attributing the adversary behind a cyber attack ranks as perhaps the hardest challenge in all of cyber security, well beyond securing networks from intrusions, for the simple …

The difficult path to cyber resilience
Global organizations are more confident than ever that they can predict and resist a sophisticated cyber attack, but are falling short of investments and plans to recover from …

Deadlines for investigating and reporting data breaches
75% of organisations set fixed time limits for investigating potential security incidents, according to Balabit. However, 44% of respondents reported missing internal or …

Approaching security self-sufficiency
As part of my role as CSO, I’m extremely lucky to get to have conversations with CISOs, CTOs, and other technology leaders across industries. One of the things that has always …

The new CISO imperative: Solving the information management paradox
In the drive to become more cyber resilient in 2017, organizations are extending risk management that is traditionally based on parametric measures (i.e., data loss prevention …

DevSecOps to drive the digital imperative
Dan Hushon, CSC’s CTO, has identified six trends around the philosophy of DevSecOps that company leaders need to be thinking about to drive digital transformation. …
Featured news
Resources
Don't miss
- CISA warns about actively exploited Broadcom, Commvault vulnerabilities
- Marks & Spencer cyber incident linked to ransomware group
- Eyes, ears, and now arms: IoT is alive
- What’s worth automating in cyber hygiene, and what’s not
- Want faster products and stronger trust? Build security in, not bolt it on