Don’t look back in anger
At the end of the 2014, as at the end of many years before it, our mailboxes were filled with various vendors’ security predictions for 2015. We saw them also in …
Identity management trends in 2015
A new year is always an excellent time to look ahead. So, there’s not much of a better time than now to look at some of the identity management trends expected for the …
Do we need regular IT security fire drills?
IT security “fire drills’, supported by executive management and the risk committee should be conducted regularly in organizations, in order to understand the …
Security of data in the cloud now an executive-level concern
The Cloud Security Alliance (CSA) surveyed more than 200 IT and security professionals, and nearly 72 percent admitted that they did not know the number of shadow IT apps …
The coming shift in security
Vendors continue to trumpet new platforms as the best way to improve enterprise-level security. Flashy spinning visualizations, added scalability and the meaningless …
The one compliance lesson you need to learn
We are living in a data driven society with globalizing economies, data transfer, and ubiquitous access to everything from everywhere. At the same time, we have seen an influx …
5 working days left until the deadline for compliance with PCI DSS 3.0 kicks in
Maintaining credit and debit card information on behalf of financial services clients demands the highest levels of security and customer confidence, and adhering to standards …
Actions to strengthen your defense, minimize damage
IT professionals should use the nearly epic scale of the Sony cyber attacks to spur their companies into action versus panicking about potential risks. “The FBI is right …
HIPAA security compliance: How risk tolerant are you?
At the heart of HIPAA lies a set of core security tenets for which every affected organization is responsible. These fundamentals are absolutely non-negotiable – but the …
Do senior executives understand their role in data security?
There are four distinct groups of organization when it comes to measuring how much value senior executives place on their company’s data and how well that data is …
10 strategies to protect patient information
Data breaches, lawsuits, medical identity theft—all cringe-worthy realities—and the threats to patient data have never been greater. With cybercrime targeting healthcare, …
Security deficiencies that increase data breach risk
Many businesses still struggle with information security deficiencies and common security weaknesses that can elevate their risk of data breaches. Based on a global survey of …
Featured news
Resources
Don't miss
- Apple offers $2 million for zero-click exploit chains
- Attackers are exploiting Gladinet CentreStack, Triofox vulnerability with no patch (CVE-2025-11371)
- October 2025 Patch Tuesday forecast: The end of a decade with Microsoft
- From theory to training: Lessons in making NICE usable
- Securing agentic AI with intent-based permissions