Please turn on your JavaScript for this page to function normally.
defend
IoT security: Defending a young industry from attack

As the IoT industry matures, it’s safe to say we’re well past “early adopter” phase and seeing broader development and deployment. While the prospect of a more established and …

SaaS
SMB security: The evolving role of SaaS and IT outsourcing

SMBs need to bridge the gap between smaller IT security budgets and a shortage of expertise to face the very real and growing threat of cyber attacks, according to Kaspersky …

abstract
Civilization infrastructure: Connected sensors and digital intelligence

A new type of infrastructure needs to be built that is not just going to reshape business, but also the way people live, according to Gartner. CIOs are the builders of this …

IoT
Democracy for the Internet of Things

In the past I’ve written a number of times on the way that the IoT potentially changes the relationship between governments and their constituents – and a profound change that …

cloud
Alarming cloud encryption misconceptions revealed

Businesses have a high level of concern about the exposure of sensitive and regulated data in the cloud to security threats. Yet despite this, the majority of data owners …

traffic
1 in 5 executives take risks with sensitive data to meet regulatory demands

The Anti-Money Laundering Directive (AML), the EU-US Privacy Shield and the Market Abuse Directive (MAD) and Regulation (MAR) are the three biggest regulatory pressures across …

face
How identity and access management is critical in the digital transformation process

Digital transformation is a top priority and source of anxiety for enterprises, but the majority of IT decision makers have not completed technology deployments to address the …

Berlin
Global cyber security leaders to gather in Berlin

A series of reports over the summer have shown not only that cybercrime is more persistent than ever, but there are also more opportunities. The growth of technology, …

GreySpark
Review: FourV Systems GreySpark

GreySpark is a solution for measuring and managing organizations’ IT security risk. GreySpark ingests information security metadata from a large range of existing …

puzzle
Components of an effective vulnerability management process

Vulnerabilities continue to grab headlines. Whether it is a zero-day that affects “tens of millions” servers around the globe or an old unpatched flaw that leads to a data …

Healthcare
SOC 2 + HITRUST: Evolving infosec demands in healthcare

Two-thirds of business associates are not fully prepared to meet the growing marketplace demands regarding controls for protecting healthcare information, such as patient …

Laptop
No more guilt about your lack of innovation in administrative IT

Helpdesks are mired in mundane tasks that are repeated every day – password resets, user account access and account creations, just to name a few. Manual tasks that really …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools