
Five trends to help senior executives protect against fraud threats
A new Experian report identifies five trends that businesses should assess and take action on to mitigate fraud and improve the customer experience in today’s …

Cyber resilience: Securing global infrastructures
It seems like every part of the human experience is touched by technology in some way. In many respects, it makes our lives safer, our communication easier, and creates …

Security in the M&A process: Have you done your technical due diligence?
Company acquisitions are common in the cyber security market. Whether you are attempting to bolster your strategic position or looking to acquire the best talent, chances are …

Most CISOs and CIOs need better resources to mitigate threats
Despite acute awareness of the millions of dollars in annual costs, and the business risks posed by external internet threats, security leaders highlight the lack of staff …

Cybersecurity concern continues to rise
A new Black Hat report reveals some critical concerns about the information security industry and emerging cyber risks faced by today’s enterprises. In 2015, Black Hat …

Keys to successful security vendor collaboration
The IT manager tasked with understanding today’s complex vendor landscape is in an unenviable position. The rapid proliferation of new types of cyber security threats and …

Manage cybersecurity risk by restoring defense-in-depth’s promise
Cybersecurity spending continues to soar, as the current, $75.4 billion worldwide market will increase to $101 billion by 2018, according to projections from Gartner. But how …

Ransomware: Can we finally start learning from past mistakes?
There is a phrase I am finding quite relevant lately. It is attributed to the philosopher George Santayana and it goes like this: “Those who cannot remember the past are …

Industrialisation of cybercrime is disrupting digital enterprises
Only a fifth of IT decision makers in large multinational corporations are confident that their organisation is fully prepared against the threat of cybercriminals. The vast …

Security startup confessions: Building a team
My name is Kai Roer and I am a co-founder of a European security startup, and these are my confessions. I hope you will learn from my struggles, and appreciate the choices …

Analyze your data: Where is it and who has it?
It is becoming widely recognized that “unknown” data leakage of PCI data, and more broadly other Personally Identifiable Information, within enterprises is the highest value …

How CISOs can work with the C-suite to define the cybersecurity risk level
Defining the cybersecurity risk level for any organization should be a collaborative effort that balances the need for risk mitigation with fiscal responsibility. Although the …
Featured news
Resources
Don't miss
- Another remotely exploitable Oracle EBS vulnerability requires your attention (CVE-2025-61884)
- Apple offers $2 million for zero-click exploit chains
- Attackers are exploiting Gladinet CentreStack, Triofox vulnerability with no patch (CVE-2025-11371)
- October 2025 Patch Tuesday forecast: The end of a decade with Microsoft
- From theory to training: Lessons in making NICE usable