Please turn on your JavaScript for this page to function normally.
ISO
Overcoming the barriers to ISO 27001 adoption for success on G-Cloud

A recent attention grabbing headline that was just too controversial to ignore: “Sloppy SaaS firms lose out on G-Cloud deals, research suggests”. In the article, …

cloud computing
Where does your cloud data live? 3 questions to ask

There’s a common thread behind every security pro’s cloud-related fears: control. Whether your company’s infrastructure revolves around a cloud-centric strategy or regulates …

building
Supporting the IT edge is expensive, full of potential security risks

Organizations are facing multiple challenges when managing the IT edge – at remote and branch offices. A Riverbed survey asked IT professionals about the various challenges …

Binary
The hunting approach to defeating cyber attacks

Security used to be all about building walls around our organizations and trying to immediately stop all attacks. But today’s adversaries are sophisticated, persistent, and …

healthcare
Healthcare needs a data centric security approach

With increasing attacks on PHI data, coupled with more stringent data security requirements and regular audits, organizations should act now – before it’s too late. A recent …

threat hunting
How do you win the web security game when the rules keep changing?

Successfully protecting against web-based attacks is like trying to win a game that keeps changing its rules, only nobody tells you what the new rules are. With a rapidly …

building blocks
Top 10 technologies for information security and their implications

Gartner highlighted the top 10 technologies for information security and their implications for security organizations in 2016. “Information security teams and …

Abstract
75% of organizations have serious cybersecurity risk exposure

Organizations that invest in detection and response technologies, rather than perimeter-based solutions, are better poised to defend against cyber incidents. The second annual …

footprint
How to consolidate your sensitive data footprint

Data is the driving force behind every organization, whether an organization is primarily a retailer, a manufacturer, healthcare provider or a bank, it will possess some if …

magnify
Harnessing integrated security analytics

Necessity is the mother of invention. To match the demands of a threat landscape that has grown exponentially in the last decade, cybersecurity innovation has moved at a …

road sign
Security startup confessions: Let’s talk about channel management

My name is Kai Roer and I am a co-founder of a European security startup, and these are my confessions. I hope you will learn from my struggles, and appreciate the choices …

The future of intrusion detection

It’s always an interesting exercise to extrapolate from current technologies and industry challenges to sketch the future landscape. This especially holds true for cyber …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools