Please turn on your JavaScript for this page to function normally.
password
How employee behavior impacts cybersecurity effectiveness

A recent OpenVPN survey discovered 25 percent of employees, reuse the same password for everything. And 23 percent of employees admit to very frequently clicking on links …

GDPR
With the GDPR, companies face new era of compliance and transparency

A new Avecto survey explored IT and security’s role in helping companies achieve compliance with the new guidelines for the collection and processing of personal …

hands
Protecting consumers from mobile and IoT threats

A new report by Allot Communications revealed a dynamic and automated threat landscape in which consumers lack the security expertise to effectively protect themselves. Mobile …

risk
How third-party risk affects your GDPR compliance

In this podcast, Darron Gibbard, Chief Technical Security Officer EMEA at Qualys, discusses third-party risk and how it affects the GDPR compliance of your organization. …

lock
Securing microservices and containers: A DevOps how-to guide

There is a simple reason for developers adopting the cloud and cloud-native application architectures. These “tools and methods” allow developers to accelerate innovation and …

USA
Shape up US businesses: GDPR will be coming stateside

Despite the significant financial penalties, US consumers have tended to look away or forgive brands in the aftermath of a breach, but recent research shows that this is no …

social media
Would you delete your account if a social media provider misused your data?

With the Facebook scandal involving Cambridge Analytica still fresh in people’s minds, two-thirds of professionals admit they would delete their account if a social media …

architecture
Five keys to secure DevOps, cloud and IoT adoption

90 percent of enterprises are engaged with at least one next-generation technology (NGT), such as cloud, IoT, or AI, according to BeyondTrust. Yet, while enterprises are …

key
Why creativity is key to security

Similar to corporate auditors and risk and compliance managers, security teams are often viewed as a hindrance to business growth. They are deemed the killjoys of business …

work
Key challenges and frustrations of SOC workers

Technology challenges, hiring and staffing issues, processes and pain points, as well as finance and funding difficulties have the potential to limit the ability of SOCs to …

mobile work
Most businesses still struggling with mobile working and security

95 percent of surveyed organisations in the UK recognise problems with mobile and remote working, and worryingly, 18% suggest their mobile workers don’t care about security, …

danger
Sophisticated keyloggers target the finance industry

Lastline found three separate strains of keylogger malware that are currently targeting finance. Lastline’s analysis of the 100 most recent malware samples found among finance …

Don't miss

Cybersecurity news