Please turn on your JavaScript for this page to function normally.
connected house
Trusted identities bridge gap between connected workers and smart buildings

Trusted identities can serve as the backbone for smart buildings and today’s connected workforce, according to a new study conducted by IFSEC Global. The study focused on how …

hand
Fostering a safe place for businesses to work in

It’s no secret that in the past few years, business leaders have begun to realise the potential of digital transformation to give their organisation a competitive edge. …

money
Average data breach cost declines 10% globally

The average cost of a data breach is $3.62 million globally, a 10 percent decline from 2016 results. This is the first time since the global study was created that there has …

center
Evaluating artificial intelligence and machine learning-based systems for cyber security

All indicators suggest that 2017 is shaping up to be the year of artificial intelligence and machine learning technology for cyber security. As with most trends in our …

World
Regional regulatory compliance trends: Strategies and implications

In this podcast, Tim White, Director of Product Management, Policy Compliance at Qualys, talks about regulatory compliance trends that across a variety of different regions in …

artificial intelligence
Perception and reality: The role of AI and automated cyber defenses

Executives in the U.S. and Europe now place broad trust in artificial intelligence (AI) and machine learning systems, designed to protect organizations from more dynamic …

skull
Most corporate finance leaders expect to change fraud-fighting strategies

Today’s senior finance executives are battling record levels of fraud, in turn narrowing corporate focus and limiting resources that could otherwise be devoted to …

puzzle
DevSecOps: Build a bridge between fast and secure software development

Despite the pervasive belief that security and development teams have conflicting priorities, initiatives such as creating DevOps environments and focusing on product …

laptop
Poor endpoint security can cost you millions in detection, response, and wasted time

A new study reveals organizations are wasting an average of $6 million on the time to detect and contain insecure endpoints, among other staggering findings that show endpoint …

stop
Where does the cyber security buck stop?

Late last year, Bruce Schneier testified before the U.S. House Energy and Commerce committee asking them to consider imposing security regulations on the Internet of Things …

success
Building a strong cybersecurity program for the long haul

Patch Tuesday is approaching and there is a chance it might be a boring one. Hopefully, I didn’t jinx things by saying that, but I think most of what we’ll see is a bit of …

crowd
Cybersecurity workforce gap to hit 1.8 million by 2022

The cybersecurity workforce gap is on pace to hit 1.8 million by 2022 – a 20% increase since 2015. 68% of workers in North America believe this workforce shortage is due to a …

Don't miss

Cybersecurity news