Please turn on your JavaScript for this page to function normally.
magnifying glass
Looking for trouble: How predictive analytics is transforming cybersecurity

Leading organizations recognize that stringent cybersecurity processes and strong infrastructure, while essential, are not enough to eliminate today’s disparate and ubiquitous …

pyramid
Maslow’s pyramid of cyber deception needs

In 1943, psychologist Abraham Maslow published his theory of human motivation, which turned into a consensual method to analyze a person’s needs. Maslow’s theory …

email
The security concerns of free email service provider use

Thanks to modern collaboration tools, today’s workforce can be more secure, efficient and powerful than ever. However, leading organizations recognize that security threats …

Tech
What is the actual value of a CISO?

For some people, it’s hard to understand what keeps them up at night. For you, the CISO, things are much clearer. Your 3:47 am thoughts are filled with data breaches, malware, …

bridge
Are you prepared for future information management requirements?

While 46 percent of federal information management professionals cite managing all types of information assets, regardless of format, as a priority for their field, many feel …

CEO
1 in 10 banking CEOs don’t know if they’ve been hacked

Twelve percent of banking CEOs say they do not have insight into whether their institution’s security has been compromised by a cyber attack in the past two years, …

arrow
Reputation damage and brand integrity: Top reasons for protecting data

Vormetric announced the results of the European Edition of the 2016 Vormetric Data Threat Report. It focuses on responses from IT security leaders in European organisations, …

business
CIOs are hindered by massive tech skills shortage

More CIOs report directly to the CEO (34 percent) than at any time in the past decade, rising 10 percent over last year, according to the 2016 Harvey Nash/KPMG CIO Survey. …

users
Only two percent of IT experts consider third-party secure access a top priority

Soha Systems released a report based on a survey conducted by the newly formed Soha Third-Party Advisory Group, which consists of security and IT experts from Aberdeen Group, …

USA flag
The 3 biggest cybersecurity risks posed in the 2016 presidential election

Here’s a question for you: What do the four recent cyber attacks from the hacker group Anonymous have in common? Attack 1: On March 4, 2016, a group inside of Anonymous …

battery
Most organizations can’t protect digital information in the long-term

New research has revealed that the majority of organizations do not have a coherent long-term strategy for their vital digital information even though virtually all of them …

Money
Security startup confessions: Limited funds and their impact on security

My name is Kai Roer and I am a co-founder of a European security startup, and these are my confessions. I hope you will learn from my struggles, and appreciate the choices …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools