Please turn on your JavaScript for this page to function normally.
face
How identity and access management is critical in the digital transformation process

Digital transformation is a top priority and source of anxiety for enterprises, but the majority of IT decision makers have not completed technology deployments to address the …

Berlin
Global cyber security leaders to gather in Berlin

A series of reports over the summer have shown not only that cybercrime is more persistent than ever, but there are also more opportunities. The growth of technology, …

GreySpark
Review: FourV Systems GreySpark

GreySpark is a solution for measuring and managing organizations’ IT security risk. GreySpark ingests information security metadata from a large range of existing …

puzzle
Components of an effective vulnerability management process

Vulnerabilities continue to grab headlines. Whether it is a zero-day that affects “tens of millions” servers around the globe or an old unpatched flaw that leads to a data …

Healthcare
SOC 2 + HITRUST: Evolving infosec demands in healthcare

Two-thirds of business associates are not fully prepared to meet the growing marketplace demands regarding controls for protecting healthcare information, such as patient …

Laptop
No more guilt about your lack of innovation in administrative IT

Helpdesks are mired in mundane tasks that are repeated every day – password resets, user account access and account creations, just to name a few. Manual tasks that really …

gear
Security orchestration and automation: Closing the gap in incident response

Companies in North America are poised to increase their reliance on security orchestration and automation for incident response (IR), according to Enterprise Strategy Group …

cloud
A closer look at data breach preparedness

While most organizations have a data breach preparedness plan in place, executives are not updating or practicing the plan regularly and lack confidence in its effectiveness, …

abstract
Big Data investments are up, but fewer organizations plan to invest

Big Data investments continue to rise but are showing signs of contracting, according to Gartner. Their survey revealed that 48 percent of companies have invested in Big Data …

Big Data
Using Big Data for intelligent enterprise security

No industry remains untouched by the potential of Big Data – and the cybersecurity sector is certainly no exception. A recent MarketsandMarkets study predicted the …

New York State
Proposed cyber security requirements for New York State seem to be more of the same

This month, New York State Governor Andrew Cuomo announced proposed regulation that requires banks, insurance companies, and other financial services institutions regulated by …

business
Security startup confessions: Hiring and firing

My name is Kai Roer and I am a co-founder of a European security startup, and these are my confessions. I hope you will learn from my struggles, and appreciate the choices …

Don't miss

Cybersecurity news