F5 Networks
F5 welcomes Mary Gardner as CISO
F5 Networks announced that Mary Gardner has joined the company’s leadership team as its chief information security officer (CISO). In this role, she is responsible for F5’s …
The ethical and legal dilemmas of threat researchers
Threat intelligence is mainstreaming into a de-facto everyday tool of cyber-defense. But all that intelligence must be collected, analyzed, and prepared by someone. Enter …
The eternal struggle: Security versus users
There’s an old joke that a job in security is a safe place to be grumpy. From what I’ve seen over my career, that is often true. Security people seem to cherish their …
Discover hidden cybersecurity talent to solve your hiring crisis
Not having access to technical talent is a common complaint in the cybersecurity world. Folks with security experience on their resumes are in such high demand, CISOs need to …
How digital transformation is reshaping the modern enterprise
F5 Networks announced the results of its 2018 State of Application Delivery report, which shows accelerating multi-cloud deployments are enabling organizations to select the …
Reacting to a big breach
As I write this, the industry is still wagging its fingers at the latest big breach. But in the time that it takes to get this published, there could easily be another …
PyCryptoMiner ropes Linux machines into Monero-mining botnet
A Linux-based botnet that has been flying under the radar has earned its master at least 158 Monero (currently valued around $63,000). The malware The botnet is based on a …
To protect your network, you must first know your network
A sobering statistic regarding commonly used security controls was highlighted in a recent report. “Software and hardware inventory and valuation” was the least …
Infosec expert viewpoint: DevOps security
A Ponemon Institute survey of nearly 1,250 global public sector IT decision makers and managers revealed that public sector organizations undergoing digital transformation are …
The evolving nature of the CISO role
As IT security increasingly becomes a priority, CISOs’ influence within companies is growing. However, security strategy in many organizations is still largely reactive and …
Featured news
Resources
Don't miss
- The long conversations that reveal how scammers work
- Metis: Open-source, AI-driven tool for deep security code review
- How to cut security tool sprawl without losing control
- Product showcase: Proton Pass, a password manager with identity protection
- Internet slowly recovers after far-reaching Cloudflare outage