cybersecurity

Regional regulatory compliance trends: Strategies and implications
In this podcast, Tim White, Director of Product Management, Policy Compliance at Qualys, talks about regulatory compliance trends that across a variety of different regions in …

Perception and reality: The role of AI and automated cyber defenses
Executives in the U.S. and Europe now place broad trust in artificial intelligence (AI) and machine learning systems, designed to protect organizations from more dynamic …

Most corporate finance leaders expect to change fraud-fighting strategies
Today’s senior finance executives are battling record levels of fraud, in turn narrowing corporate focus and limiting resources that could otherwise be devoted to …

DevSecOps: Build a bridge between fast and secure software development
Despite the pervasive belief that security and development teams have conflicting priorities, initiatives such as creating DevOps environments and focusing on product …

Poor endpoint security can cost you millions in detection, response, and wasted time
A new study reveals organizations are wasting an average of $6 million on the time to detect and contain insecure endpoints, among other staggering findings that show endpoint …

Where does the cyber security buck stop?
Late last year, Bruce Schneier testified before the U.S. House Energy and Commerce committee asking them to consider imposing security regulations on the Internet of Things …

Building a strong cybersecurity program for the long haul
Patch Tuesday is approaching and there is a chance it might be a boring one. Hopefully, I didn’t jinx things by saying that, but I think most of what we’ll see is a bit of …

Cybersecurity workforce gap to hit 1.8 million by 2022
The cybersecurity workforce gap is on pace to hit 1.8 million by 2022 – a 20% increase since 2015. 68% of workers in North America believe this workforce shortage is due to a …

While on vacation, users continue to prioritize convenience over security
Despite the benefits experienced from unplugging, most individuals prefer to stay connected. Fifty-two percent of U.S. respondents indicated that they spend at least an hour a …

The cost of IoT hacks: Up to 13% of revenue for smaller firms
Nearly half of U.S. firms using an Internet of Things (IoT) network have been hit by a recent security breach, which can cost up to 13% of smaller companies’ annual revenue, …

Ready or not, IoT third party risks are here
A new survey conducted by The Ponemon Institute uncovered a high rate of concern among organizations about the security of IoT, yet a gap in understanding of how to mitigate …

Rising volume of attacks overpowers security teams
New research from IDC that shows organizations are constantly under attack and struggling to keep up. The research finds most organizations run time-consuming security …
Featured news
Resources
Don't miss
- How military leadership prepares veterans for cybersecurity success
- Fighting fraud with AI: The new identity security playbook
- Brute-force attacks hammer Fortinet devices worldwide
- For $40, you can buy stolen police and government email accounts
- Vulnerabilities in MSP-friendly RMM solution exploited in the wild (CVE-2025-8875, CVE-2025-8876)