Please turn on your JavaScript for this page to function normally.
Sun Tzu 2.0: Is cyberwar the new warfare?

For better or worse, the multitude of networks that help keep our world interconnected is a much different place today than it was in the past. Paradoxically, the networks …

Breaches might be inevitable, but penalties are not harsh enough

A panel on the topic of data breaches organized by cyber security and penetration testing company Cognosec has revealed that most industry professionals believe that breaches …

Automated threat management: No signature required

The industry approach to detecting threats is inherently reactive, ceding the first-mover advantage to the cyber criminals. Defenses – based on signatures, reputation lists …

The challenges of implementing tokenization in a medium-sized enterprise

We have seen a concerning pattern in the recent data breaches, including the breach at the Internal Revenue Services (IRS) and other US government agencies in that the primary …

Do CISOs deserve a seat at the leadership table?

A ThreatTrack security survey of C-level executives at U.S. enterprises employing a CISO found that despite a rash of high-profile data breaches in the last year, many in the …

Information security governance practices are maturing

Information security governance practices are maturing according to Gartner’s annual end-user survey for privacy, IT risk management, information security, business …

How to apply threat intelligence feeds to remediate threats

IT organizations are recognizing the value of threat intelligence feeds, and that’s good. Threat intelligence is a must-have for identifying malware and other threats that …

Are IT pros overconfident in their ability to deflect attacks?

IT executives within critical infrastructure organizations see a need for public-private threat intelligence sharing partnerships (86% of respondents) to keep pace with …

Unsharing in the sharing economy

It’s been a big year for the sharing economy. Numerous consumer services have skyrocketed to popularity by basing their business on the sharing of resources. Companies like …

CFOs are not confident about their level of security

CFOs’ long-term outlook for the North American economy remains strong despite their weakening confidence in their own companies’ prospects, according to Deloitte. Lower …

The difficult task of meeting compliance needs

Compliance is a complex issue in many industries and organizations know all too well that there are major fines and potential punishments for not meeting the laws and …

3 ways to stop insider threats in your organization

No one wants their organization to be the next poster child for a major informational breach. No one wants their company to make headlines for having their data compromised or …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools