The rise of the Chief IoT Officer
Half of UK businesses (54%) plan to employ a Chief IoT Officer in the next year, especially in the education (63%), retail (63%) and telecomms (64%) industries, according to …
Video: Trust in the Cloud panel
Here is video recording of a “Trust in the Cloud” panel which was a part of the Rackspace::Solve NYC event held last Thursday. Rackspace Security leader David …
Security guidance for the Internet of Things
Embedded systems and connected devices are already deeply woven into the fabric of our lives, and the footprint is expanding at a staggering rate. Gartner estimates that 4.9 …
Know your enemy: The most popular hacking methods
Outsiders want to become insiders with the least possible effort, and insiders help them do so – mostly accidentally, according to Balabit. 54% of the survey respondents …
When it comes to cyber attack detection, IT pros are overconfident
A new study conducted by Dimensional Research evaluated the confidence of IT professionals regarding the efficacy of seven key security controls that must be in place to …
IoT security guidelines for providers, vendors, and network operators
The GSMA Association has published new guidelines designed to promote the secure development and deployment of services in the growing Internet of Things (IoT) market. …
What’s the real cost of a security breach?
The majority of business decision makers admit that their organisation will suffer an information security breach and that the cost of recovery could start from around $1 …
5 ways to protect your company data from internal attacks
While Hollywood may love the image of the hacker lurking in the shadows, stealthily pillaging from across cyberspace, the reality is that threats from inside your network, …
Modern IRM: Securing the future of work
No matter what business you’re in, the one thing you produce more than anything else is text. Every day, you and your colleagues are creating, discussing, and documenting …
Surprise? Most organizations are not cyber resilient
71 percent of UK organisations would rate their cyber resilience as low today, underlining a lack of preparedness to handle cyberattacks by the majority of UK organisations, …
Your board and cyber risk: Reimagining security protocols from the top down
As scrutiny of well-known financial services firms’ security practices continues to make news, the SEC has chosen to turn its attention to risks facing a certain subset of the …
The history of cyber attacks: From ancient to modern
In the 1990s, your typical hacker’s approach used to be “hit-and-run”, and in many cases it was about fame and recognition. Back in those days most organizations only had a …
Featured news
Resources
Don't miss
- GitHub-hosted malware campaign uses split payload to evade detection
- Measuring security performance in real-time, not once a quarter
- Attackers are handing off access in 22 seconds, Mandiant finds
- Product showcase: Cross-platform and third-party endpoint patching with Action1
- Quantum threats are already active and the defense response remains fragmented