Fostering a safe place for businesses to work in
It’s no secret that in the past few years, business leaders have begun to realise the potential of digital transformation to give their organisation a competitive edge. …
Security startup confessions: Attending industry events
My name is Kai Roer and I am a co-founder of European security startup CLTRe, and these are my confessions. I hope you will learn from my struggles, and appreciate the choices …
Evaluating artificial intelligence and machine learning-based systems for cyber security
All indicators suggest that 2017 is shaping up to be the year of artificial intelligence and machine learning technology for cyber security. As with most trends in our …
Regional regulatory compliance trends: Strategies and implications
In this podcast, Tim White, Director of Product Management, Policy Compliance at Qualys, talks about regulatory compliance trends that across a variety of different regions in …
DevSecOps: Build a bridge between fast and secure software development
Despite the pervasive belief that security and development teams have conflicting priorities, initiatives such as creating DevOps environments and focusing on product …
Why companies shouldn’t dread the advent of GDPR
The main aim of the General Data Protection Regulation (GDPR) is to make sure that the data of EU citizens is protected, no matter where it’s held. The regulation, which will …
Fine-tuning the SOX compliance process
The annual Sarbanes-Oxley (SOX) Compliance Survey released by Protiviti reveals a new set of challenges facing public companies amid their compliance efforts. PCAOB audit …
What’s an IT architect, and could you become one?
If you’re a Computer Science student or an IT professional looking for a new job that’s interesting, well paid, and for which demand is constant, you might want to …
Where does the cyber security buck stop?
Late last year, Bruce Schneier testified before the U.S. House Energy and Commerce committee asking them to consider imposing security regulations on the Internet of Things …
While on vacation, users continue to prioritize convenience over security
Despite the benefits experienced from unplugging, most individuals prefer to stay connected. Fifty-two percent of U.S. respondents indicated that they spend at least an hour a …
Foscam IP cameras riddled with gaping security holes
F-Secure researchers have discovered a bucketload of serious security vulnerabilities affecting IP cameras made by Chinese manufacturer Foscam. Even though notified months …
How to stay secure while staying connected on vacation
The wide availability of Wi-Fi networks can make it difficult to unplug and disconnect on vacation, but if consumers take that extra step and unplug they can experience a more …
Featured news
Sponsored
Don't miss
- How a GRC consultant passed the CISSP exam in six weeks
- BLint: Open-source tool to check the security properties of your executables
- Tailoring responsible AI: Defining ethical guidelines for industry-specific use
- Are you meeting your cyber insurance requirements?
- Black Basta target orgs with new social engineering campaign