
Do public clouds make it more difficult to get visibility into data traffic?
The second annual Ixia 2018 Security Report analyzes how enterprise network attack surfaces are increasing as the perimeter of the traditional network expands into the cloud. …

CEO priorities are shifting to embrace digital business
Growth tops the list of CEO business priorities in 2018 and 2019, according to a recent survey of CEOs and senior executives by Gartner. However, the survey found that as …

The eternal struggle: Security versus users
There’s an old joke that a job in security is a safe place to be grumpy. From what I’ve seen over my career, that is often true. Security people seem to cherish their …

IT audit best practices: Technological changes give rise to new risks
IT security and privacy, IT governance and risk management, regulatory compliance, emerging technology and cloud computing are the key issues impacting IT audit plans in 2018, …

Cyber attacks are becoming more organized and structured
Trustwave released the 2018 Trustwave Global Security Report which reveals the top security threats, breaches by industry, and cybercrime trends from 2017. The report is …

Fewer records breached: Cybercriminals focus on ransomware, destructive attacks
According to the 2018 IBM X-Force Threat Intelligence Index, the number of records breached dropped nearly 25 percent in 2017, as cybercriminals shifted their focus on …

How to close the security update gap
Security patching is hard and patch fatigue is real. So what can be done to make the process more simple, less disruptive, and more likely to be performed in a timely manner? …

Are legacy technologies a threat to EU’s telecom infrastructure?
Telecommunications is a key infrastructure based on how our society works. It constitutes the main instrument that allows our democracy and our EU core values such as freedom, …

The current state of USB data protection
Data protection, whether related to personal customer or patient information, is critical across virtually all industries. So how can organizations best protect their most …

Businesses suspect their mobile workers are being hacked
More than half (57%) of organisations suspect their mobile workers have been hacked or caused a mobile security issue in the last 12 months, according to the iPass Mobile …

Compliance functions make a turn towards innovation-fueled strategies
Faced with growing threats of ‘industry shocks’ such as cyber fraud, cryptocurrency, quantum computing and open banking, financial institutions expect to increase their …

Using deception to gain enterprise IoT attack visibility
The main lessons from attacks against Internet of Things (IoT) devices are to change default usernames and passwords, use longer passphrases to avoid brute force attacks, and …