Only two percent of IT experts consider third-party secure access a top priority
Soha Systems released a report based on a survey conducted by the newly formed Soha Third-Party Advisory Group, which consists of security and IT experts from Aberdeen Group, …
The 3 biggest cybersecurity risks posed in the 2016 presidential election
Here’s a question for you: What do the four recent cyber attacks from the hacker group Anonymous have in common? Attack 1: On March 4, 2016, a group inside of Anonymous …
Most organizations can’t protect digital information in the long-term
New research has revealed that the majority of organizations do not have a coherent long-term strategy for their vital digital information even though virtually all of them …
Security startup confessions: Limited funds and their impact on security
My name is Kai Roer and I am a co-founder of a European security startup, and these are my confessions. I hope you will learn from my struggles, and appreciate the choices …
Security spending rises in areas ineffective against multi-stage attacks
Vormetric announced the results of the Financial Services Edition of the 2016 Vormetric Data Threat Report (DTR). This edition extends earlier findings of the global report, …
What a Security Evangelist does, and why you need one
Here is a simple truth: You can create the most revolutionary product ever, but if you can’t get word about it out, you’ll fail. Information security vendors …
Review: The Information Systems Security Officer’s Guide, Third Edition
About the author Dr. Gerald Kovacich has over 40 years of security, criminal and civil investigations, anti-fraud, information warfare, and information systems security …
Third party risk on the rise, risk mitigation still not a priority
Given today’s cyber security climate, it is no surprise that companies are wary of the risks associated with third party vendors. Unfortunately, these risks are only …
Security startup confessions: Choosing a tech partner
My name is Kai Roer and I am a co-founder of a European security startup, and these are my confessions. I hope you will learn from my struggles, and appreciate the choices …
Living in a password free world in the modern enterprise
The era of password security in the modern enterprise is over. Passwords are dead. Let’s be honest. Passwords in the enterprise were never really that secure in the …
Cybersecurity insurance: A global perspective
While the majority of global organizations say that it is “vital” their organization is insured against information security breaches, less than half (41%) are …
The economics of hacking: Change your thinking
If you saw the film Wall Street, you undoubtedly recall the iconic character Gordon Gekko famously stating, “what’s worth doing is worth doing for money.” This perspective is …
Featured news
Resources
Don't miss
- Unpatched Windows vulnerability continues to be exploited by APTs (CVE-2025-9491)
- CISA and partners take action as Microsoft Exchange security risks mount
- Shadow AI: New ideas emerge to tackle an old problem in new form
- AI chatbots are sliding toward a privacy crisis
- You can’t audit how AI thinks, but you can audit what it does