cybersecurity
Ready, set, race to the IoT hub
Battle lines are being drawn. Armies are being marshaled. Territory is being eyed and strategies drawn up with military precision. But this war is about to be fought in your …
After a data breach is disclosed, stock prices fall an average of 5%
Data security breaches can negatively impact an entire organization – including sales, marketing and IT – and have a significant negative impact on company …
Key to smart cybersecurity spending: Remove redundancies and strive for unification
Over the past two decades, the cybersecurity industry has been completely transformed. For organizations, cybersecurity’s evolution from a cottage industry to an economic …
Privacy awareness checklist for GDPR readiness
A little more than a year out from its effective date of May 25, 2018, the General Data Protection Regulation (GDPR) is undoubtedly on the minds of many of privacy …
Industry reactions to Trump’s executive order on cybersecurity
On Thursday, President Donald Trump signed a long-awaited executive order on cybersecurity. Mainly, the order requires a number of cybersecurity reviews across the various …
Keys to attracting and retaining cybersecurity talent
Federal agencies need to invest strategically and heavily in their benefits strategy if they’re going to successfully compete for cybersecurity talent, according to the …
Data security disruptions can have cascading negative impacts
Nine in 10 global cybersecurity and risk experts believe that cyber risk is systemic and that simultaneous attacks on multiple companies are likely in 2017, according to AIG. …
Most companies falsely believe their Active Directory is secure
A majority of companies falsely believe their Active Directory (AD) is secure, according to a new survey conducted jointly by Skyport Systems and Redmond Magazine. The …
Cybersecurity analytics and operations: Need for automation and orchestration
New research from Enterprise Strategy Group (ESG) shows that when it comes to the evolution of Cybersecurity Analytics and Operations, 71% of respondent organizations find it …
Is remote access technology leaving you vulnerable?
Insider and third-party access are growing security threats facing organizations and enterprise IT systems, according to Bomgar. Proliferation of security issues Despite …
What healthcare CISOs should know
“Are we more secure today than yesterday?” is the question every healthcare organization needs to asks itself every day. in order to develop a more effective security posture, …
SOCs are maturing, but need more automation
Security operations centers (SOCs) are growing up, according to a new SANS survey. Respondents indicate the SOC’s primary strengths are flexibility of response and …
Featured news
Resources
Don't miss
- AI isn’t one system, and your threat model shouldn’t be either
- LLMs work better together in smart contract audits
- Product showcase: NAKIVO v11.1 advances MSP service delivery with secure multi-tenant management
- Crypto theft in 2025: North Korean hackers continue to dominate
- Clipping Scripted Sparrow’s wings: Tracking a global phishing ring