Please turn on your JavaScript for this page to function normally.
What IT workplace issues keep CIOs awake at night?

What worries chief information officers (CIOs) and IT professionals the most? According to a recent survey by Sungard AS, downtime and talent acquisition weigh heaviest on …

Guidance to improve risk management and IoT

As connected devices infiltrate the workplace—some with IT’s knowledge and some without—both value and risk can increase significantly. ISACA has released new guidance …

Infosec management strategies and the modern CTO

Lumenta recently appointed Brandon Hoffman as their new CTO. We took this opportunity to get his perspective on the management strategies that are essential in the information …

Cybersecurity readiness: Widening gulf between perception and reality

Attackers have become more proficient at taking advantage of gaps in security to evade detection and conceal malicious activity, according to Cisco. Defenders, namely, …

How to prepare if you’re selected for an OCR audit

The forthcoming Office of Civil Rights (OCR) audits for HIPAA compliance have seen some delays this fall – but that doesn’t mean covered organizations can delay …

Five key security, identity and access management trends

CA Technologies announced five key trends for security and identity and access management (IAM) that will impact organizations and security professionals in 2015 as they …

Reactions to David Cameron’s plan to ban end-to-end encryption

On Tuesday, British Prime Minister David Cameron announced his plan to introduce new surveillance powers in the UK, and ban applications that use end-to-end encryption. Here …

Cost of breach vs. cost of deployment

In security terms, 2014 read like a who’s who of data breaches. Huge, global companies like Target, eBay and Coca-Cola have succumbed to data loss. Public services like …

Don’t look back in anger

At the end of the 2014, as at the end of many years before it, our mailboxes were filled with various vendors’ security predictions for 2015. We saw them also in …

Identity management trends in 2015

A new year is always an excellent time to look ahead. So, there’s not much of a better time than now to look at some of the identity management trends expected for the …

Do we need regular IT security fire drills?

IT security “fire drills’, supported by executive management and the risk committee should be conducted regularly in organizations, in order to understand the …

Security of data in the cloud now an executive-level concern

The Cloud Security Alliance (CSA) surveyed more than 200 IT and security professionals, and nearly 72 percent admitted that they did not know the number of shadow IT apps …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools