
The state of the cloud and the Software-Defined Data Center
We’ve long been moving toward cloud-based and virtualized infrastructures, but in some ways 2016 might just be the year in which the Software-Defined Data Center (SDDC) really …

Take it to the boardroom: Elevating the cybersecurity discussion
As data breaches continue to rise, organizations, regardless of their size or industry they are in, must take into consideration a new mindset. Despite the FBI’s focus on …

Does hybrid IT offer a competitive advantage?
Hybrid IT is about more than saving money. A survey of IT decision-makers at major financial services, retail, health care, and other organizations found that 50 percent have …

The dangers of bad cyber threat intelligence programs
I love a surprise ending in a movie. Whether I’m watching drama, action, or sci-fi, there’s nothing better than a plot twist you can’t predict. At work, however, I feel the …

Don’t get stuck with dead end User Behavior Analytics
As the frequency of sophisticated cyberattacks continue to increase, User Behavior Analytics (UBA) has taken center stage. It now seems like every vendor in security, no …

Creating secure devices for the Internet of Things
The Internet of Things (IoT) and subsequent explosion of connected devices have created a world of opportunities we might never have anticipated. But have these new …

Banks failing with password management, but why?
A recent study shows some terrifying results: banks in the U.S. often have less secure password policies in place than do social media websites. Specifically, the study found …

5 key questions to determine your security posture
To understand any businesses’ security posture, one must first understand the eight categories of cybersecurity that is impacted: security intelligence, fraud, people, …

Privacy by Design: What it is and where to build it
People tend to think about privacy in terms of the individual, but it is also critically important for the proper functioning of any business organization. This is being made …

Why the next wave of cybersecurity talent won’t have a ‘security’ job title
Over the past five years, we’ve witnessed the state of cybersecurity become chaotic – and, quite frankly, grim – across a variety of industries. Hotels, financial …

Security concerns limit business initiatives
Though the C-suite recognizes the benefits of data security, organizations are still struggling to develop programs that effectively incorporate security strategies without …

RSA Conference 2016: The infosec glass house?
A couple of years late to the party, but I finally made it to San Francisco with a real sense of excitement to attend what was described to me as the “Super Bowl of the …
Featured news
Resources
Don't miss
- Product showcase: Ledger Flex secure crypto wallet
- Villain: Open-source framework for managing and enhancing reverse shells
- Securing the invisible: Supply chain security trends
- Why cyber resilience must be part of every organization’s DNA
- 44% of the zero-days exploited in 2024 were in enterprise solutions