Please turn on your JavaScript for this page to function normally.
puzzle
DevSecOps: Build a bridge between fast and secure software development

Despite the pervasive belief that security and development teams have conflicting priorities, initiatives such as creating DevOps environments and focusing on product …

laptop
Poor endpoint security can cost you millions in detection, response, and wasted time

A new study reveals organizations are wasting an average of $6 million on the time to detect and contain insecure endpoints, among other staggering findings that show endpoint …

stop
Where does the cyber security buck stop?

Late last year, Bruce Schneier testified before the U.S. House Energy and Commerce committee asking them to consider imposing security regulations on the Internet of Things …

success
Building a strong cybersecurity program for the long haul

Patch Tuesday is approaching and there is a chance it might be a boring one. Hopefully, I didn’t jinx things by saying that, but I think most of what we’ll see is a bit of …

crowd
Cybersecurity workforce gap to hit 1.8 million by 2022

The cybersecurity workforce gap is on pace to hit 1.8 million by 2022 – a 20% increase since 2015. 68% of workers in North America believe this workforce shortage is due to a …

employee
While on vacation, users continue to prioritize convenience over security

Despite the benefits experienced from unplugging, most individuals prefer to stay connected. Fifty-two percent of U.S. respondents indicated that they spend at least an hour a …

IoT
The cost of IoT hacks: Up to 13% of revenue for smaller firms

Nearly half of U.S. firms using an Internet of Things (IoT) network have been hit by a recent security breach, which can cost up to 13% of smaller companies’ annual revenue, …

IoT
Ready or not, IoT third party risks are here

A new survey conducted by The Ponemon Institute uncovered a high rate of concern among organizations about the security of IoT, yet a gap in understanding of how to mitigate …

struggle
Rising volume of attacks overpowers security teams

New research from IDC that shows organizations are constantly under attack and struggling to keep up. The research finds most organizations run time-consuming security …

calculator
Half of US firms don’t have cybersecurity insurance

A full 50 percent of US firms do not have cybersecurity insurance, despite the fact that 61 percent of US firms expect the volume of cyber breaches to increase in the next …

GDPR
Balancing act: Ensuring compliance with GDPR and US regulations

The impending GDPR, which will go into effect in a little less than a year from now, is going to have a significant impact on enterprise cybersecurity and data governance …

phishing
Analyzing phishing attacks against 500,000 mailboxes at 100 organizations

Phishing has evolved from a mere nuisance into a global epidemic in which organizations of all sizes and across all industries are being negatively impacted at high frequency. …

Don't miss

Cybersecurity news