Please turn on your JavaScript for this page to function normally.
stop
Business suffers as over-zealous security tools block legitimate work

Most security teams utilise a ‘prohibition approach’ – i.e. restricting user access to websites and applications – a tactic which is hampering productivity and innovation …

Terminal
Most organizations don’t have SSH security policies in place

Cybercriminals can abuse SSH keys to secure and automate administrator-to-machine and machine-to-machine access to critical business functions. According to Venafi’s research, …

container
Enterprise container security: There’s room for improvement

With companies such as Facebook, Netflix and Google heralding the use of containers for their agility, portability, and cost benefits – enterprises are following suit. …

transformation
Digital skills gap: The biggest hindrance to addressing cybersecurity?

Although businesses recognize the importance of digital transformation, organizations worldwide are struggling to balance the elements needed to deliver on digital. Of 1,625 …

binary
The pervasive risk of vulnerable open source components

Veracode announced findings from the 2017 State of Software Security Report, a comprehensive review of application security testing data from scans conducted by a base of more …

Businessman juggling
Should non-security functions get more involved in cybersecurity?

According to a survey conducted by Dimensional Research, 100 percent of respondents believe soft skills are important when hiring for their security teams. The three most …

transform
Digital transformation and the loss of security control

Unpatched web infrastructure and de-centralised web management practices are leaving UK organisations vulnerable to cyber-attacks and high profile data breaches. New RiskIQ …

tunnel
Are you employees snooping on the corporate network?

The overwhelming majority of employees are deliberately seeking out information they are not permitted to access, exposing a major snooping problem among today’s workforce. …

open source
Companies turn a blind eye to open source risk

Though open source software (OSS) helps software suppliers be nimble and build products faster, there are hidden software supply chain risks all software suppliers and IoT …

GDPR
As GDPR implementation date approaches, cyber risk gets more attention

The upcoming implementation of the European Union’s General Data Protection Regulation (GDPR), which takes effect in May 2018, has elevated cyber risk to the top of the …

Office 365
Office 365 adoption drivers, risks, and opportunities

Over 1,100 organizations ranging from single-person businesses to companies with more than 10,000 employees participated in a survey from various regions around the globe …

building blocks
Almost half of non-IT and data pros don’t understand blockchain

A survey of over 200 board level UK executives has found that while over half of businesses sampled are planning blockchain initiatives, less than 1 in 10 believe they have …

Don't miss

Cybersecurity news