Please turn on your JavaScript for this page to function normally.
Identifying the five principal methods of network attacks

Companies are underestimating the risk of failing to provide security training to non-technical staff.A new Intel Security study, which surveyed IT decision makers in …

Risk management programs lack maturity, new strategies needed

With cyber attacks and data security threats looming at insecure access points, the increased scrutiny of regulators and the focused attention of boards of directors, the …

What a business leader should know about the cloud and its impact

Great companies see business risks as opportunities, and execute strategies accordingly. Such a mentality is compatible with emerging technologies. IT plays a vital role in …

Never underestimate the impact of a data breach

The growth of cyber-crime and the impact of successful attacks on an organization’s bottom-line should not be underestimated; it is anticipated that data breaches will …

We don’t know what we don’t know

Citing the latest cyber security statistics is a popular way for security companies to show that they are keeping a watchful eye on the threat landscape. Where does the …

The best way to prevent data breaches? It’s not what you think

Data security breaches seem to be popping up almost daily. From the 2015 IRS breach, to the hacking of federal government employees’ data by China, it’s clear much of our most …

You’ve been breached, now what?

Everybody tends to think that hackers will never ever target them or their company/organization until a breach occurs. This article concentrate on post-incident actions and …

Why vulnerability disclosure shouldn’t be a marketing tool

There have been many arguments within the security community on how researchers should disclose the existence of a security vulnerability. Some argue that full disclosure is …

The cloud, FedRAMP and FISMA compliance

Many federal agencies and government contractors are migrating to cloud-based computing, a trend that will pick up speed as the cloud becomes more efficient, more affordable, …

How to survive a compliance audit

Ipswitch polled 313 IT professionals in United States with 59 percent noting that they were not fully prepared to undergo an audit. Additionally, 75 percent of respondents …

Businesses know about POS security risks, but are they investing wisely?

The majority of organizations have increased their POS security budgets during the last two years, but many of them are still using and investing in outdated technologies, …

How lack of trust and limited knowledge impact your organization

There are significant gaps in cybersecurity knowledge, shared visibility and mutual trust between those who serve on organizations’ board of directors and IT security …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools