Please turn on your JavaScript for this page to function normally.
gear
Why you need a tailored application security program

For companies that provide applications to their customers, keeping those applications secure is a must. Setting up an application security program is the next logical step, …

money
CSOs reveal true cost of breaches

Over one-third of organizations that experienced a breach in 2016 reported substantial customer, opportunity and revenue loss of more than 20 percent, according to the Cisco …

alert
Six best practices for managing cyber alerts

Security professionals know that the number of cyber alerts is growing at a frantic pace. Even a mid-sized company can face tens of thousands of alerts every month. As the …

labyrinth
Irregular application testing: App security in healthcare

Nearly half (45%) of NHS trusts scan for application vulnerabilities just once a year, with less only 8% doing so on a daily basis, according to Veracode. This potentially …

shield
Is it time to call an MSSP? Five signs that it can’t wait

Small and midsize businesses (SMBs) are fighting an uphill battle when it comes to managing their network security. According to a 2016 Ponemon study, 69 percent of SMBs don’t …

tools
Half of IT pros don’t know how to improve their security posture

Mid-market enterprises have high confidence in their cybersecurity defenses, but they struggle to defend against malicious activity that has become more sophisticated and …

lighter
Most organizations are unaware of daily malicious activity

A new DomainTools survey of more than 550 security analysts, IT managers, and executives revealed that the majority of organizations are struggling to monitor and prevent …

money
Security budgets shifting from prevention to detection

According to industry estimates, enterprises have historically spent more than 75% of their infosec technology budgets on preventative technologies. According to a new survey …

corporate cloud
Key cloud adoption trends and challenges for government entities

Cloud computing has become a trending topic for federal CIOs in the last few years, according to Netwrix. In response to the Obama administration’s cloud-first …

bridge
Security management outlook: Five trends to watch

Cybersecurity can’t sit still. As we look ahead to what this year has in store for the security management landscape, organizations globally should be paying attention to five …

Lock
Global data privacy laws: The #1 cross-border e-discovery challenge

In the year since the EU’s rejection of Safe Harbor, there has been a spike in legal concern over cross-border data transfers, according to a survey by BDO Consulting. Sixty …

architecture
Majority of SOCs are below optimal maturity levels

With increased pressure to rapidly innovate and align security initiatives with business goals, a SOC provides the foundation for how organizations protect their most …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools