Please turn on your JavaScript for this page to function normally.
organize
Only half of CI/CD workflows include appsec testing elements

Only half of CI/CD workflows include application security testing elements despite respondents citing awareness of the importance and advantages of doing so, according to a …

glasses
Cyber risk assessment and disclosure requirements: What’s important to you?

In this podcast recorded at RSA Conference 2018, Jerry Caponera, VP cyber risk strategy at Nehemiah Security, offers some interesting thoughts on cyber risk assessment and …

question
Are your organization’s key assets at risk?

A new study conducted by the Ponemon Institute shows increases in threats and awareness of threats to knowledge assets, as well as improvements in addressing those threats by …

binary
SOCs require automation to avoid analyst fatigue for emerging threats

A survey conducted by LogicHub at RSA Conference 2018 identified 79 percent of respondents believe both human expertise and security automation is needed for a powerful …

Absolute
Solving the dark endpoint problem with increased visibility and control

In this podcast recorded at RSA Conference 2018, Richard Henderson, Global Security Strategist at Absolute Software, and Todd Wakerley, EVP of Product Development at Absolute …

danger
Most dangerous attack techniques, and what’s coming next

Experts from SANS presented the five most dangerous new cyber attack techniques in their annual RSA Conference 2018 keynote session in San Francisco, and shared their views on …

handshake
What’s your security story? How to use security as a sales tool

Positioning security as a value-add to the business rather than a necessary evil is a challenge for many organizations. Since the dawn of enterprise computing, information …

stock price
Key obstacles in enterprise security budgeting

IANS released its latest findings on budget-related best practices for information security leaders to consistently command the budget and resources they need. “It’s part of …

burn
2.6 billion records were stolen, lost or exposed worldwide in 2017

Gemalto released the latest findings of the Breach Level Index, revealing that 2.6 billion records were stolen, lost or exposed worldwide in 2017, an 88% increase from 2016. …

question
How many can detect a major cybersecurity incident within an hour?

Less than half of all organizations were able to detect a major cybersecurity incident within one hour. Even more concerning, less than one-third said that even if they …

user
Security teams are under resourced, overwhelmed by attackers

A new report conducted by the Ponemon Institute uncovered security’s “patching paradox” – hiring more people does not equal better security. While security teams plan to hire …

danger
Fewer records breached: Cybercriminals focus on ransomware, destructive attacks

According to the 2018 IBM X-Force Threat Intelligence Index, the number of records breached dropped nearly 25 percent in 2017, as cybercriminals shifted their focus on …

Don't miss

Cybersecurity news