It’s time for a common sense security framework
Privacy Rights Clearinghouse maintains a database of every data breach made public since 2005, and as the total number of records rapidly approaches one billion, board …
What’s really stopping users from adopting secure communication tools?
“Users’ goal to communicate with others overrides everything else, including security,” a group of researchers has concluded after interviewing sixty individuals …
Rising volume of attacks overpowers security teams
New research from IDC that shows organizations are constantly under attack and struggling to keep up. The research finds most organizations run time-consuming security …
What will it take to keep smart cities safe?
“Smart cities” use smart technologies in their critical infrastructure sectors: energy, transportation, environment, communications, and government. This includes …
5 incident response practices that keep enterprises from adapting to new threats
Security analysts within enterprises are living a nightmare that never ends. 24 hours a day, their organizations are being attacked by outside (and sometimes inside) …
Guidance for connected vehicle security: Attack vectors and impacts
The Cloud Security Alliance (CSA) released its first ever research and guidance report on connected vehicle security. Authored by the CSA’s Internet of Things (IoT) …
How to build a better SOC team
The security skills shortage is a very real issue. Cisco estimates that there are currently one million unfilled cyber security jobs worldwide, while a report from Frost …
Cybersecurity: Industry concerns and suggestions for policy makers
The EU Agency for Network and Information security – ENISA – together with industry recently reached a common position on cybersecurity, that reflects the concerns of industry …
How to secure your digital transformation
Organizations are demanding and implementing new solutions that enable them to streamline operations, cultivate new business opportunities and provide better service to their …
Software security assurance: Everybody’s invited
As more and more things in this world of ours run on software, software security assurance – i.e. confidence that software is free from vulnerabilities (either …
Protecting your cloud from ransomware
For enterprises that use the cloud, the key to being protected starts with understanding the layers that make up the components of their cloud stack. These different layers …
A guide on how to prevent ransomware
Ransomware is fast becoming a major threat to computer systems in many organisations. It is an aggressive form of attack which criminals use to infect computers and block the …
Featured news
Sponsored
Don't miss
- How a GRC consultant passed the CISSP exam in six weeks
- BLint: Open-source tool to check the security properties of your executables
- Tailoring responsible AI: Defining ethical guidelines for industry-specific use
- Are you meeting your cyber insurance requirements?
- Black Basta target orgs with new social engineering campaign