Please turn on your JavaScript for this page to function normally.
question
Six data security questions that every board needs to ask

As data breaches become a constant headline, data security should be a major concern for company boards everywhere. Unless a board member has been hired specifically to …

Internet of Things
Defining and securing the Internet of Things

The EU Cybersecurity Agency ENISA published a report on the security of the Internet of Things (IoT). The study aims to set the scene for IoT security in Europe. It serves as …

Black Friday
Black Friday: When is a deal too good to be true?

Black Friday, the American sales phenomenon that allegedly marked the time of year when retailers began to make a profit – moving from the ‘red’ to the ‘black’ – has …

Pyeongchang 2018
South Korea Winter Olympics: Cyber lessons from the past

There is little doubt that guns, gates, and guards will be on full alert in Pyeongchang, South Korea as the nation readies itself for the 2018 Winter Olympics, which begin …

EU GDPR Documentation Toolkit
Review: EU GDPR Documentation Toolkit

The General Data Protection Regulation (GDPR) aims to strengthen data protection for all individuals within the EU (citizens and residents). It was adopted in April 2016, and …

gift
This year’s most hackable holiday gifts

McAfee announced its third annual Most Hackable Holiday Gifts list to help consumers identify potential security risks associated with popular gifts this holiday season. In …

tools
Risk assessment: The first step in improving cyber security

Despite the proliferation of high profile cyber-attacks over the last 18 months, many organisations are still too disorganised in their approach to security. While it is no …

hunt
Extortion-based cyber attacks: The next evolution in profit-motivated attack strategies

Today, data breaches have impacted just about every industry possible. From entertainment to the restaurant industry, no sector or organization appears to be safe, and it has …

BEC scams
BEC scammers stealing millions from home buyers

Business Email Compromise (BEC) scams have been on the rise for the last few years, and no industry is safe from these scammers. It has been revealed last week that art …

up
Is trading resilience for business growth a smart strategy?

Not long ago, the probability of a threat materializing was enough to open the IT pocketbook. Today, the mentality has shifted from one of risk prevention to one of risk …

shift digital business
Top 10 ways to fund the shift to digital business

With many options for digital business transformation requiring significant investment, Gartner has identified the top 10 ways to fund the shift to digital business. According …

patch
Infosec expert viewpoint: Vulnerability patching

Vulnerability patching is one of the most useful and cost-effective methods to mitigate a plethora of security threats. Here’s what infosec experts think about the …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools