
The damaging divide in application security
It’s time to get serious about application security and the divisive reality of breaches. Even with today’s intense focus on security, web application attacks are on the rise: …

Keys to successful security vendor collaboration
The IT manager tasked with understanding today’s complex vendor landscape is in an unenviable position. The rapid proliferation of new types of cyber security threats and …

Network monitoring tips for an increasingly unsafe world
Enterprise IT has evolved significantly over the last decade. Today, IT teams are not only responsible for the availability and performance of their network but also the …

Review: Linux Server Security
About the author Chris Binnie is a Technical Consultant with 20 years of experience working with Linux systems, and a writer for Linux Magazine and Admin Magazine. He built an …

How CISOs can work with the C-suite to define the cybersecurity risk level
Defining the cybersecurity risk level for any organization should be a collaborative effort that balances the need for risk mitigation with fiscal responsibility. Although the …

Review: Secure & Simple: A Small-Business Guide to Implementing ISO 27001 On Your Own
About the author Dejan Kosutic is the author of numerous articles, tutorials, documentation templates, webinars, and courses about information security and business continuity …