75% of organizations have serious cybersecurity risk exposure
Organizations that invest in detection and response technologies, rather than perimeter-based solutions, are better poised to defend against cyber incidents. The second annual …
How to consolidate your sensitive data footprint
Data is the driving force behind every organization, whether an organization is primarily a retailer, a manufacturer, healthcare provider or a bank, it will possess some if …
Harnessing integrated security analytics
Necessity is the mother of invention. To match the demands of a threat landscape that has grown exponentially in the last decade, cybersecurity innovation has moved at a …
Security startup confessions: Let’s talk about channel management
My name is Kai Roer and I am a co-founder of a European security startup, and these are my confessions. I hope you will learn from my struggles, and appreciate the choices …
The future of intrusion detection
It’s always an interesting exercise to extrapolate from current technologies and industry challenges to sketch the future landscape. This especially holds true for cyber …
Looking for trouble: How predictive analytics is transforming cybersecurity
Leading organizations recognize that stringent cybersecurity processes and strong infrastructure, while essential, are not enough to eliminate today’s disparate and ubiquitous …
Maslow’s pyramid of cyber deception needs
In 1943, psychologist Abraham Maslow published his theory of human motivation, which turned into a consensual method to analyze a person’s needs. Maslow’s theory …
The security concerns of free email service provider use
Thanks to modern collaboration tools, today’s workforce can be more secure, efficient and powerful than ever. However, leading organizations recognize that security threats …
What is the actual value of a CISO?
For some people, it’s hard to understand what keeps them up at night. For you, the CISO, things are much clearer. Your 3:47 am thoughts are filled with data breaches, malware, …
Are you prepared for future information management requirements?
While 46 percent of federal information management professionals cite managing all types of information assets, regardless of format, as a priority for their field, many feel …
1 in 10 banking CEOs don’t know if they’ve been hacked
Twelve percent of banking CEOs say they do not have insight into whether their institution’s security has been compromised by a cyber attack in the past two years, …
Reputation damage and brand integrity: Top reasons for protecting data
Vormetric announced the results of the European Edition of the 2016 Vormetric Data Threat Report. It focuses on responses from IT security leaders in European organisations, …
Featured news
Resources
Don't miss
- Hottest cybersecurity open-source tools of the month: November 2025
- Gainsight breach: Salesforce details attack window, issues investigation guidance
- New “HashJack” attack can hijack AI browsers and assistants
- Heineken CISO champions a new risk mindset to unlock innovation
- Small language models step into the fight against phishing sites