Please turn on your JavaScript for this page to function normally.
lights
Growing risk associated with mobile and IoT application security

Despite widespread concern about the security of mobile and Internet of Things applications, organizations are ill-prepared for the risks they pose, according to research …

architecture
Majority of SOCs are below optimal maturity levels

With increased pressure to rapidly innovate and align security initiatives with business goals, a SOC provides the foundation for how organizations protect their most …

hand
82% of executives experienced a fraud incident in the past year

Fraud, cyber, and security incidents are now the “new normal” for companies across the world, according to the executives surveyed for a new Kroll report. The …

snake
Top cyber concerns plaguing digital enterprises

69% of senior security and IT executives say digital transformation is forcing fundamental changes to existing cybersecurity strategies, according to BMC and Forbes Insights. …

door
Addressing the challenges of vulnerability coordination

The FIRST Vulnerability Coordination Special Interest Group (SIG) made available for public comment through January 31, 2017 the draft Guidelines and Practices for Multi-party …

rings
New security concerns due to business complexities

It is estimated that in 2016, more than $94 billion will be invested in security solutions, per industry analyst forecasts, yet nearly half of organizations report having had …

biohazard
Will 2017 be the year of ransomworm?

It’s safe to say that 2016 was the year of ransomware. More specifically, the year of crypto-ransomware, that nefarious variant that encrypts files and holds them captive …

idea
Top obstacles and benefits of security framework adoption

95 percent of organizations face significant challenges when implementing leading cybersecurity frameworks, according to Tenable Network Security and the Center for Internet …

cloud computing
Enhanced security facilitates your safe move to the cloud

If you haven’t moved at least some of your data to the cloud, you will. It’s inevitable at this point. Even the most highly secured organizations have some of their data on …

path
The difficult path to cyber resilience

Global organizations are more confident than ever that they can predict and resist a sophisticated cyber attack, but are falling short of investments and plans to recover from …

hot
Deadlines for investigating and reporting data breaches

75% of organisations set fixed time limits for investigating potential security incidents, according to Balabit. However, 44% of respondents reported missing internal or …

gears
Approaching security self-sufficiency

As part of my role as CSO, I’m extremely lucky to get to have conversations with CISOs, CTOs, and other technology leaders across industries. One of the things that has always …

Don't miss

Cybersecurity news