Please turn on your JavaScript for this page to function normally.
Continuous Diagnostics and Mitigation capability requirements need re-prioritization

There is a lot to like in the $6 billion Continuous Diagnostics and Mitigation (CDM) program being administered by the DHS across more than 100 federal civilian agencies. The …

CTOs targeted with tax-themed phishing emails carrying malware

Tax-themed phishing emails targeting CTOs of tech companies have been spotted by researchers at Talos, Cisco’s security intelligence and research group. The initial …

96% say ISO 27001 is important for improving security defenses

Already established as international best practice, the information security management standard ISO 27001 has become an effective weapon in the fight against cyber crime. It …

Don’t wait until you’re attacked to take cybersecurity seriously

CISOs foresee cyber terrorism and cybercrime posing significant risks to their organizations over the next three years, according to Raytheon and the Ponemon Institute. The …

Security now one of the top risks for business leaders worldwide

Cybersecurity has come to the forefront of risk oversight for board members and C-suite executives, according to results of a survey of business executives by Protiviti and …

INTERPOL and the fast-paced digital threat landscape

Dr. Madan Oberoi is the Director of Cyber Innovation and Outreach Directorate at the INTERPOL Global Complex for Innovation in Singapore. In this interview he talks about the …

Which kind of security professional are you?

Much has been said and written about the arrogance prevalent in the computer industry, especially that of gamers and security professionals. A well-known female gamer recently …

IT professional, hack thyself

To anyone not living under a rock, the increasing threat of a cyber attack is very plain. IT professionals spend sleepless nights worrying that they’ll be the next …

How a penetration test helps you meet PCI compliance guidelines

In order to protect credit card data, sometimes businesses have to think like a hacker. Every year, merchants who transmit, process, or store payment card data must conduct a …

What infosec can learn from the Greek elections

Sometimes disruption just happens. It occurs when something creates a dramatic change of direction, and examples are all around us: the introduction of the GUI, the iPod and …

Overcoming the daily challenges of a security team

The constantly evolving cyber threat landscape is resulting in new challenges and approaches for today’s security analyst teams. In the past, companies looked at the …

Do government initiatives increase security awareness?

New research, by SecureData and Vanson Bourne, investigated the impact government security initiatives had on end-user organizations in 2014, with nearly half (47%) reporting …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools