Please turn on your JavaScript for this page to function normally.
Reactions to David Cameron’s plan to ban end-to-end encryption

On Tuesday, British Prime Minister David Cameron announced his plan to introduce new surveillance powers in the UK, and ban applications that use end-to-end encryption. Here …

Cost of breach vs. cost of deployment

In security terms, 2014 read like a who’s who of data breaches. Huge, global companies like Target, eBay and Coca-Cola have succumbed to data loss. Public services like …

Don’t look back in anger

At the end of the 2014, as at the end of many years before it, our mailboxes were filled with various vendors’ security predictions for 2015. We saw them also in …

Identity management trends in 2015

A new year is always an excellent time to look ahead. So, there’s not much of a better time than now to look at some of the identity management trends expected for the …

Do we need regular IT security fire drills?

IT security “fire drills’, supported by executive management and the risk committee should be conducted regularly in organizations, in order to understand the …

Security of data in the cloud now an executive-level concern

The Cloud Security Alliance (CSA) surveyed more than 200 IT and security professionals, and nearly 72 percent admitted that they did not know the number of shadow IT apps …

The coming shift in security

Vendors continue to trumpet new platforms as the best way to improve enterprise-level security. Flashy spinning visualizations, added scalability and the meaningless …

The one compliance lesson you need to learn

We are living in a data driven society with globalizing economies, data transfer, and ubiquitous access to everything from everywhere. At the same time, we have seen an influx …

5 working days left until the deadline for compliance with PCI DSS 3.0 kicks in

Maintaining credit and debit card information on behalf of financial services clients demands the highest levels of security and customer confidence, and adhering to standards …

Actions to strengthen your defense, minimize damage

IT professionals should use the nearly epic scale of the Sony cyber attacks to spur their companies into action versus panicking about potential risks. “The FBI is right …

HIPAA security compliance: How risk tolerant are you?

At the heart of HIPAA lies a set of core security tenets for which every affected organization is responsible. These fundamentals are absolutely non-negotiable – but the …

Do senior executives understand their role in data security?

There are four distinct groups of organization when it comes to measuring how much value senior executives place on their company’s data and how well that data is …

Don't miss

Cybersecurity news