cybersecurity

Five mental shifts we must make to achieve security beyond perimeters
Data centers aren’t exactly going extinct, but given the massive shift to public clouds, you need to make some significant adjustments if your mindset doesn’t already include …

Let no endpoint go dark
The compromise of a single enterprise endpoint can ultimately lead to a wider security incident, ransomware outbreak, data breach, costly remediation and rebuilding of lost …

Five things CIOs can do as IoT adoption turns into a nightmare
There is no doubt that IoT technology has tremendous potential to improve outcomes for customers and also deliver significant business outcomes. As businesses are increasing …

How enterprises must prepare for the tech generation
With fall in full swing, HR departments are being flooded with resumes from new graduates looking to enter the workforce. But this year’s crop of new talent has some key …

Our smart future and the threat of cyber-kinetic attacks
A growing number of today’s entertainment options show protagonists battling cyber-attacks that target the systems at the heart of our critical infrastructure whose failure …

Consumers are ready to say goodbye to passwords
A new survey of 1,000 Americans exploring awareness and perceptions of biometric authentication confirms that consumers continue to have a strong interest in new biometric …

Examining attitudes towards confidential data
Industry analyst firm Quocirca surveyed 500 IT decision makers in the United States, Canada, United Kingdom, Australia and Japan, examining attitudes towards the value of …

Preventing good containers from going bad
Containers go bad everyday, and often without warning. All it takes is one CVE impacting an image, and now all containers deployed using this image are at an increased level …

Complex regulations and sophisticated cyberattacks inflate non-compliance costs
The cost of non-compliance has significantly increased over the past few years, and the issue could grow more serious. 90 percent of organizations believe that compliance with …

Taking the physician’s pulse on cybersecurity
More than four in five U.S. physicians (83 percent) have experienced some form of a cybersecurity attack, according to Accenture and the American Medical Association (AMA). …

IoT data exchange: Building trust and value
The results of Cisco’s IoT Value/Trust Paradox report show that, while most consumers believe IoT services deliver significant value for them, very few understand or …

Emerging trends companies should prepare for in 2018
Today’s organizations face a cyber security landscape that is more difficult to navigate than ever before. To shed light on what lies ahead and help businesses better …
Featured news
Resources
Don't miss
- Hackers used Cisco zero-day to plant rootkits on network switches (CVE-2025-20352)
- Microsoft revokes 200 certs used to sign malicious Teams installers
- A new approach to blockchain spam: Local reputation over global rules
- SAP zero-day wake-up call: Why ERP systems need a unified defense
- “Perfect” Adobe Experience Manager vulnerability is being exploited (CVE-2025-54253)