
Mobile security stripped bare: Why we need to start again
We’re all familiar with the cartoon image of a character stopping a water leak by plugging a finger into the hole, only for another leak to start, needing another finger, and …

By 2018, 25 percent of new mobile apps will talk to IoT devices
With the convergence of devices, bots, things and people, organizations will need to master two dimensions of mobility, according to Gartner. CIOs and IT leaders will need to …

Incident response survival guide
All organizations are impacted by a security breach at some point. As the joke goes in the security industry, businesses fall into two categories: those that have been …

Bad security habits persist, despite rising awareness
While 82 percent of respondents believe the IT security industry is making progress against cyber attacks, those gains are undercut by egregious security practices in critical …

Should you trust your security software?
The complaint that security is broken isn’t new and even industry insiders are joining the chorus. Companies spent an estimated $75 billion last year on security products and …

Improve SecOps by making collaboration easier
There’s one word that we’ve consistently been hearing from information security pundits year after year: Collaboration. More often than not, they were talking …

Five ways to respond to the ransomware threat
The ransomware threat has taken a sharp upturn this year. In fact, a recent industry study found that nearly half of all U.S. businesses have experienced at least one …

Automation isn’t one-size fits all
It’s no secret that security teams are understaffed despite increased pressure to deliver. Firewall engineers face an additional challenge when it comes to access request …

Best practices for using military grade security
Governments and militaries around the world have long recognised that their lines of communications were often their weakest links and required some of the strongest …

What differentiates a great CIO from simply a good one?
Earlier this month, Sophos announced the appointment of Tony Young as the company’s new global Chief Information Officer (CIO). Young started his career as a software …

How to choose a perfect data control solution for your enterprise
Not long ago, people used to come to work and work off of a desktop computer, tied to the network. Today, they work on their mobile devices, physically untethered to it. In …

Risk and the Pareto Principle: Applying the 80/20 rule to your risk management strategy
Enterprises these days are putting more resources into monitoring and managing business risk. And with good reason – in light of a growing number of vulnerabilities and …
Featured news
Resources
Don't miss
- Apple offers $2 million for zero-click exploit chains
- Attackers are exploiting Gladinet CentreStack, Triofox vulnerability with no patch (CVE-2025-11371)
- October 2025 Patch Tuesday forecast: The end of a decade with Microsoft
- From theory to training: Lessons in making NICE usable
- Securing agentic AI with intent-based permissions