strategy

IT leaders wrestling hyper-converged infrastructure security
New research from WinMagic, surveying over 1,000 IT Decision Makers (ITDM) about hyper-converged infrastructure (HCI) has revealed flexibility (65%), performance (58%) and …

Big data and insurance: Implications for innovation and privacy
The use of big data analytics in insurance offers societal benefits, as improved understanding of risks can inform risk reduction and enhance insurability. However, …

Cyber resiliency: Risks organizations take every day
77 percent of respondents to a study conducted by Ponemon Institute admit they do not have a formal cyber security incident response plan (CSIRP) applied consistently across …

Global security trends for 2018: GDPR, identity and access security
In its third annual global IT security survey, Versasec found Europe’s General Data Protection Regulation (GDPR) is impacting security planning around the world, smart …

Nearly half of security pros rarely change their security strategy, even after a cyber attack
Nearly half (46 percent) of IT security professionals rarely change their security strategy substantially – even after experiencing a cyber attack. This level of cyber …

Digital readiness and transformation: Agile and DevOps
While most organizations are committed to the full adoption of both agile and DevOps, many are struggling with key challenges and missing out on the extensive benefits these …

What if defenders could see the future? Many clues are out there
Malware sophistication is increasing as adversaries begin to weaponize cloud services and evade detection through encryption, used as a tool to conceal command-and-control …

How organizations are confronting escalating third-party cyber risk
Based on in-depth interviews with security executives from 30 participating organizations across multiple industries, RiskRecon revealed how companies are managing the …

Poor communication between CEOs and technical officers leads to misalignment
A misalignment between CEOs and technical officers is weakening enterprise cybersecurity postures, according to Centrify. CEOs are incorrectly focused on malware, creating …

Expected changes in IT/OT convergence and industrial security
Ten years ago, I was brought into the industrial security arena by a top company executive in who was convinced that we needed traditional endpoint protection on smart meters. …

The four myths hampering cybersecurity maturity
We’ve seen tremendous advances in technology over the last 15 years or so, but security continues to struggle as much today as it did a decade ago. A large part of the …

Discover hidden cybersecurity talent to solve your hiring crisis
Not having access to technical talent is a common complaint in the cybersecurity world. Folks with security experience on their resumes are in such high demand, CISOs need to …
Featured news
Resources
Don't miss
- Critical SAP NetWeaver flaw exploited by suspected initial access broker (CVE-2025-31324)
- Threat actors are scanning your environment, even if you’re not
- GoSearch: Open-source OSINT tool for uncovering digital footprints
- Rack Ruby vulnerability could reveal secrets to attackers (CVE-2025-27610)
- Top must-visit companies at RSAC 2025