The cloud, FedRAMP and FISMA compliance
Many federal agencies and government contractors are migrating to cloud-based computing, a trend that will pick up speed as the cloud becomes more efficient, more affordable, …
How to survive a compliance audit
Ipswitch polled 313 IT professionals in United States with 59 percent noting that they were not fully prepared to undergo an audit. Additionally, 75 percent of respondents …
Businesses know about POS security risks, but are they investing wisely?
The majority of organizations have increased their POS security budgets during the last two years, but many of them are still using and investing in outdated technologies, …
How lack of trust and limited knowledge impact your organization
There are significant gaps in cybersecurity knowledge, shared visibility and mutual trust between those who serve on organizations’ board of directors and IT security …
How engaged is the average board when it comes to security?
Tripwire evaluated the attitudes of executives as they relate to cybersecurity risk decision-making and communication between IT security professionals, executive teams and …
U.S. Open primer: In the cloud or on the golf course, hazards can be devastating
This week the U.S. Open heads to the Pacific Northwest for the very first time. Chambers Bay Golf Course in Washington State will play host. Anyone familiar with this course …
Relying on your insurer for security? Think again!
Data breaches are a regular occurrence, one need simply look at the papers to read about the myriad of breaches that have occurred over the last year. From the Sony attack in …
Insider threat: A crack in the organization wall
Vormetric announced the European findings of a survey conducted by Harris Poll in fall 2014 among 818 enterprise IT decision makers (ITDMs) in various countries, including 204 …
Zero Trust approach to network security
Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.With Zero Trust there …
Emulating the security analyst with software
This is the second installation of a two-part article discussing why static security detection methods can no longer protect enterprises from advanced hacking efforts. In this …
Instilling a culture of cyber security
Every company that sells cyber security technology markets how their tools will “defend”, “stop threats” and “protect”. There is no doubt that the technologies that exist …
Does size matter when it comes to cybersecurity?
RSA released its inaugural Cybersecurity Poverty Index that compiled survey results from more than 400 security professionals across 61 countries. The survey allowed …
Featured news
Resources
Don't miss
- Another remotely exploitable Oracle EBS vulnerability requires your attention (CVE-2025-61884)
- Apple offers $2 million for zero-click exploit chains
- Attackers are exploiting Gladinet CentreStack, Triofox vulnerability with no patch (CVE-2025-11371)
- October 2025 Patch Tuesday forecast: The end of a decade with Microsoft
- From theory to training: Lessons in making NICE usable