Please turn on your JavaScript for this page to function normally.
How engaged is the average board when it comes to security?

Tripwire evaluated the attitudes of executives as they relate to cybersecurity risk decision-making and communication between IT security professionals, executive teams and …

U.S. Open primer: In the cloud or on the golf course, hazards can be devastating

This week the U.S. Open heads to the Pacific Northwest for the very first time. Chambers Bay Golf Course in Washington State will play host. Anyone familiar with this course …

Relying on your insurer for security? Think again!

Data breaches are a regular occurrence, one need simply look at the papers to read about the myriad of breaches that have occurred over the last year. From the Sony attack in …

Insider threat: A crack in the organization wall

Vormetric announced the European findings of a survey conducted by Harris Poll in fall 2014 among 818 enterprise IT decision makers (ITDMs) in various countries, including 204 …

Zero Trust approach to network security

Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.With Zero Trust there …

Emulating the security analyst with software

This is the second installation of a two-part article discussing why static security detection methods can no longer protect enterprises from advanced hacking efforts. In this …

Instilling a culture of cyber security

Every company that sells cyber security technology markets how their tools will “defend”, “stop threats” and “protect”. There is no doubt that the technologies that exist …

Does size matter when it comes to cybersecurity?

RSA released its inaugural Cybersecurity Poverty Index that compiled survey results from more than 400 security professionals across 61 countries. The survey allowed …

What’s driving security budgets and technology purchases?

IT security and IT leaders and their staff members do not agree on security objectives, according to findings from a new global Ponemon study.One of the key findings from the …

Proactive FISMA compliance with continuous monitoring

After a great deal of debate and delay, the Federal Information Security Management Act (FISMA) finally saw a substantive update in December 2014. For federal agencies and the …

A fundamental shift in security spending

Firms are shifting their cyber security spend away from traditional Prevent & Protect approaches towards Detect & Respond operations, according to Pierre Audoin …

Confusion regarding strategic defenses for network security

RedSeal uncovered a high level of confusion regarding security issues in the network infrastructure. Nearly 60% of the 350 C-level executives surveyed believe they can …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools