strategy

9 in 10 organizations have a cybersecurity culture gap
With cybersecurity threats continuing to escalate worldwide, the ISACA/CMMI Institute Cybersecurity Culture Report found that just 5 percent of employees think their …

You are who you say you are: Establishing digital trust with the blockchain
Over the last few years, blockchain use has gained popularity driven partly by the interest in cryptocurrency, but mostly with the growing understanding of what distributed …

The future of OT security in modern industrial operations
Both the likelihood and consequences of cyberattacks to OT/ICS components continue to grow for modern industrial operations. In this podcast, Andrew Ginter, VP of Industrial …

Stringent password rules lower risk of personal data breaches
The all-too-common practice of using the same email address/password combination to log into multiple websites can be damaging, especially for employers with many users and …

Every month should be Cyber Security Awareness Month
In 2004, October was deemed National Cyber Security Awareness Month (NCSAM). This was an initiative promoted by the National Cyber Security Division (NCSD) within the …

Your backup data sets can become a treasure trove for advanced threat detection
Despite ever increasing investments in security technologies, data breaches and cyber incidents are increasing at a relentless rate, and the problem is projected to keep …

Four critical KPIs for securing your IT environment
In 2018, the average cost of a data breach is more than $3.75 million, and experts expect this number to rise in the coming years. This staggering—and potentially …

945 data breaches led to compromise of 4.5 billion data records in first half of 2018
Gemalto released the latest findings of the Breach Level Index, a global database of public data breaches, revealing 945 data breaches led to 4.5 billion data records being …

Keeping your cloud malware-free: What you need to know
This year we’ve seen massive malware attacks spanning from nation state campaigns originating in North Korea and Russia to popular restaurants and everything in between. Each …

DevOps and digital transformation initiatives are creating insecure apps
WhiteHat Security released its 2018 Application Security Statistics Report, “The Evolution of the Secure Software Lifecycle,” which identifies the security vulnerabilities and …

Global spending on security solutions to reach $133.7 billion in 2022
Worldwide spending on security-related hardware, software, and services is forecast to reach $133.7 billion in 2022, according to IDC. Although spending growth is expected to …

Modern application architectures create vast business benefits
Adopting a modern application architecture is critical to business success and a significant driver of profit growth in today’s digital economy, according to the results of a …
Featured news
Resources
Don't miss
- Critical SAP NetWeaver flaw exploited by suspected initial access broker (CVE-2025-31324)
- Threat actors are scanning your environment, even if you’re not
- GoSearch: Open-source OSINT tool for uncovering digital footprints
- Rack Ruby vulnerability could reveal secrets to attackers (CVE-2025-27610)
- Top must-visit companies at RSAC 2025