Please turn on your JavaScript for this page to function normally.
The appliance straightjacket and its effect on security

We have a love/hate relationship with our IT appliances. These technology workhorses impress us with their modern, industrial designs, bright colors, and slick branding. When …

Why governments need to take the lead in cybersecurity

Time and time again we hear people lament about the impact cybercrime has on our businesses, our individual lives, the economy, and on society. Report after report show the …

Most companies don’t believe their information security meets their organization’s needs

More than one-third (36%) of global organizations still lack confidence in their ability to detect sophisticated cyber attacks, according to EY.The survey of 1,755 …

Stolen or lost devices and the risks of remote working

44 percent of organizations believe a member of their senior management has lost a mobile device in the last year, whilst 39 percent say senior management had a device …

The transformative technology security nightmare

They say that every silver lining comes with a cloud attached and that’s certainly true of today’s transformative technologies. CEOs and the board rightly see BYOD, Cloud and …

90% of directors believe regulators should hold firms liable for hacks

A new Veracode and NYSE Governance Services survey of 276 board members reveals how cybersecurity-related corporate liability is being prioritized in the boardroom.Nine out of …

Business leaders increasingly drive cloud migration

Vanson Bourne polled 500 UK IT and business decision-makers who have either been through or are currently planning a cloud migration project. They found that the decision to …

Understanding a new security market: User behavior analytics

We know that tracking enterprise log data to discover suspicious activity from hackers or malicious insider threats is not a new idea. Five to 10 years ago, we saw the SIEM …

Cyber operational readiness and a complex threat landscape

Mike Walls is the Managing Director, Security Operations and Analysis at EdgeWave. In this interview he discusses keeping pace with an increasingly complex threat landscape, …

Are IT security pros optimistic or naïve?

Half of IT security practitioners in the U.S. view their organization as an unlikely target for attack, according to a Ponemon Institute survey of 614 IT security …

What should companies do after a wide-scale data breach?

It is not always possible to prevent such attacks, however, it is possible to make them highly unlikely to succeed. It is also possible to limit the extent of possible damage …

Wargame teaches senior leaders about strategic threats and risks

On Oct. 13 Booz Allen and the FC2 held a cybersecurity wargame simulation for senior officials in the public and private sectors at the University of South Florida, the home …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools