Please turn on your JavaScript for this page to function normally.
shopping
Retailers largely lack on-site security and IT expertise

A new Cybera survey of more than 50 retail professionals found that many retailers lack the necessary IT staff at the store level to ensure proper solution implementation and …

architecture
Majority of SOCs are below optimal maturity levels

With increased pressure to rapidly innovate and align security initiatives with business goals, a SOC provides the foundation for how organizations protect their most …

hand
82% of executives experienced a fraud incident in the past year

Fraud, cyber, and security incidents are now the “new normal” for companies across the world, according to the executives surveyed for a new Kroll report. The …

Head
What resellers think about threats to customers

A new survey, designed to capture the reseller’s perspective on customer cyber threat concerns and their overall understanding of the firewall market, examined the views …

In 2017, the digital will get physical when machines start to lie

In a memorable scene from a 2014 episode of the series Homeland, the Vice President is murdered by hackers who tamper with his pacemaker. Despite this plot idea reportedly …

snake
Top cyber concerns plaguing digital enterprises

69% of senior security and IT executives say digital transformation is forcing fundamental changes to existing cybersecurity strategies, according to BMC and Forbes Insights. …

rings
New security concerns due to business complexities

It is estimated that in 2016, more than $94 billion will be invested in security solutions, per industry analyst forecasts, yet nearly half of organizations report having had …

idea
Top obstacles and benefits of security framework adoption

95 percent of organizations face significant challenges when implementing leading cybersecurity frameworks, according to Tenable Network Security and the Center for Internet …

hourglass
More attacks, new technologies: Cybersecurity predictions for the year ahead

Every day, the cybersecurity landscape changes. Each new device connected to the network presents a new target for attackers that needs to be secured, and each new social …

earth
Playing the blame game: Breaking down cybersecurity attribution

Attributing the adversary behind a cyber attack ranks as perhaps the hardest challenge in all of cyber security, well beyond securing networks from intrusions, for the simple …

gears
Approaching security self-sufficiency

As part of my role as CSO, I’m extremely lucky to get to have conversations with CISOs, CTOs, and other technology leaders across industries. One of the things that has always …

industry
End the air gapping myth in critical infrastructure security

In an environment where we’re seeing increasing demand for connectivity between operational technology (OT) and IT, security teams have to dispel the air gapping myth to …

Don't miss

Cybersecurity news