strategy

Our smart future and the threat of cyber-kinetic attacks
A growing number of today’s entertainment options show protagonists battling cyber-attacks that target the systems at the heart of our critical infrastructure whose failure …

Examining attitudes towards confidential data
Industry analyst firm Quocirca surveyed 500 IT decision makers in the United States, Canada, United Kingdom, Australia and Japan, examining attitudes towards the value of …

Global security spending to reach $96 billion in 2018
Gartner forecasts worldwide enterprise security spending to total $96.3 billion in 2018, an increase of 8 percent from 2017. Organizations are spending more on security as a …

Security and costs holding back those looking to implement IoT projects
While 94% of IT professionals from organisations that are undertaking Internet of Things (IoT) initiatives say they need to invest in IoT over the next 12 months in order to …

The key to success with prevention strategies like remote browser isolation
It is tempting as a security practitioner to think you can prevent every attack. Especially in a people-strapped industry, why wouldn’t you want to? If we could just use …

Only 12% or organizations are likely to detect a sophisticated cyber attack
Organizations believe that today’s cyber threat landscape places them at high risk of cyber attacks. The EY survey of nearly 1,200 C-level leaders of the world’s …

5 cloud storage predictions for 2018
At this point, the cloud is old news. This does not, however, diminish its continuing impact on individuals and businesses worldwide. As cloud-based services strive towards …

Most businesses to invest in artificial intelligence by 2020
Eighty-five per cent of senior executives plan to invest in artificial intelligence (AI) and the Internet of Things (IoT) by 2020, according to a new survey of UK digital …

Why hackers reuse malware
Software developers love to reuse code wherever possible, and hackers are no exception. While we often think of different malware strains as separate entities, the reality is …

South Korea Winter Olympics: Cyber lessons from the past
There is little doubt that guns, gates, and guards will be on full alert in Pyeongchang, South Korea as the nation readies itself for the 2018 Winter Olympics, which begin …

Are your enterprise leaders digitally literate?
Only 53 percent of surveyed business technology professionals believe their organization’s leadership is digitally literate, according to ISACA. The other 47 percent either …

Infosec expert viewpoint: IoT security initiatives
IoT went quickly from buzzword to mainstream, and connected devices have become common in households and enterprises around the globe. A worrying lack of regulation has fueled …
Featured news
Resources
Don't miss
- Critical SAP NetWeaver flaw exploited by suspected initial access broker (CVE-2025-31324)
- Threat actors are scanning your environment, even if you’re not
- GoSearch: Open-source OSINT tool for uncovering digital footprints
- Rack Ruby vulnerability could reveal secrets to attackers (CVE-2025-27610)
- Top must-visit companies at RSAC 2025