Budget and job trend data for CISOs
Wisegate released its IT Security Benchmark Report, based on a survey developed by Wisegate Members, who are senior CISOs and security practitioners, to answer the questions …
Attackers sharpen skills: What that really means for CISOs
Today, IBM is revealing the results of its X-Force 2013 Mid-Year Trend and Risk Report, which shows that Chief Information Security Officers (CISOs) must increase their …
Recommendations for strengthening cyber security policies
McAfee and the Digital Government Security Forum (DGSF) released a new report which explores the cyber risks confronting government and offers recommendations to mitigate …
Tips for educational organizations on how to defend against online threats
The kids are back to school and hopefully they’re heeding the right advice on how to stay safe in an educational environment, but students aren’t the only ones who …
What CISOs must learn from Bitcoin and a research team at Georgia Tech
It has been an eventful time in the mobile world with two recent breaking stories revealing vulnerabilities in the security infrastructure for Android and iOS respectively. …
(IN)SECURE Magazine issue 39 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 39 has been released today. Table of contents: …
61% of IT pros don’t report security risks to executives
A new Ponemon Institute study examined the disconnect between an organization’s commitments to risk-based security management and its ability to develop the …
Most security managers don’t trust their apps
Application vulnerabilities are a major factor in the cybercrime game. More than 500 CISOs and Security managers have been interviewed by Quotium about the security state of …
The current state of application security
New research offers a better way to understand the maturity of an organization’s application security program in comparison to the core competencies of high-performing …
There are no winners in the blame game
Every time a major security breach makes the headlines, a common reaction happens. Even before the details of the breach are known, the infosec world gets into a frenzy of …
How encryption and tokenization help with cloud services adoption
Today’s CIOs and CISOs are facing continued pressure to adopt the cloud enterprise-wide while managing the increasing operational and security risks associated with it. …
Most government CIO budgets flat or increasing in 2013
Despite a continuing drive to lower the cost of IT services, nearly 75 percent of government IT budgets globally were reported as flat or increasing in 2013, according to the …
Featured news
Resources
Don't miss
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)
- New Microsoft accounts will be “passwordless by default”
- Why SMEs can no longer afford to ignore cyber risk
- Preparing for the next wave of machine identity growth
- Hottest cybersecurity open-source tools of the month: April 2025