Please turn on your JavaScript for this page to function normally.
arrow
Reputation damage and brand integrity: Top reasons for protecting data

Vormetric announced the results of the European Edition of the 2016 Vormetric Data Threat Report. It focuses on responses from IT security leaders in European organisations, …

business
CIOs are hindered by massive tech skills shortage

More CIOs report directly to the CEO (34 percent) than at any time in the past decade, rising 10 percent over last year, according to the 2016 Harvey Nash/KPMG CIO Survey. …

users
Only two percent of IT experts consider third-party secure access a top priority

Soha Systems released a report based on a survey conducted by the newly formed Soha Third-Party Advisory Group, which consists of security and IT experts from Aberdeen Group, …

USA flag
The 3 biggest cybersecurity risks posed in the 2016 presidential election

Here’s a question for you: What do the four recent cyber attacks from the hacker group Anonymous have in common? Attack 1: On March 4, 2016, a group inside of Anonymous …

battery
Most organizations can’t protect digital information in the long-term

New research has revealed that the majority of organizations do not have a coherent long-term strategy for their vital digital information even though virtually all of them …

Money
Security startup confessions: Limited funds and their impact on security

My name is Kai Roer and I am a co-founder of a European security startup, and these are my confessions. I hope you will learn from my struggles, and appreciate the choices …

Money
Security spending rises in areas ineffective against multi-stage attacks

Vormetric announced the results of the Financial Services Edition of the 2016 Vormetric Data Threat Report (DTR). This edition extends earlier findings of the global report, …

Businessman
What a Security Evangelist does, and why you need one

Here is a simple truth: You can create the most revolutionary product ever, but if you can’t get word about it out, you’ll fail. Information security vendors …

The Information Systems Security Officer's Guide, Third Edition
Review: The Information Systems Security Officer’s Guide, Third Edition

About the author Dr. Gerald Kovacich has over 40 years of security, criminal and civil investigations, anti-fraud, information warfare, and information systems security …

person
Third party risk on the rise, risk mitigation still not a priority

Given today’s cyber security climate, it is no surprise that companies are wary of the risks associated with third party vendors. Unfortunately, these risks are only …

Arrows
Security startup confessions: Choosing a tech partner

My name is Kai Roer and I am a co-founder of a European security startup, and these are my confessions. I hope you will learn from my struggles, and appreciate the choices …

Living in a password free world in the modern enterprise

The era of password security in the modern enterprise is over. Passwords are dead. Let’s be honest. Passwords in the enterprise were never really that secure in the …

Don't miss

Cybersecurity news