Please turn on your JavaScript for this page to function normally.
learn
Modernizing cybersecurity training for the next generation

Equifax, Verizon, Molina Healthcare, Deloitte, Whole Foods, Wendy’s… it seems like every time we turn on the television another high-profile data breach is being …

mobile work
The mobile workforce: Productive, but susceptible to data compromise

An enterprise’s biggest problem when it comes to data compromise isn’t just technologies that are vulnerable, it’s how their employees use technology. Digital transformation, …

bulb
7 tips to reduce risks of data breaches

A recent study conducted by Forrester Consulting found that two-thirds of organizations have been breached five times in the past two years. It’s clear that traditional …

GDPR
The clock is ticking on GDPR: Is your business ready?

Despite having almost two years to prepare for the General Data Protection Regulation (GDPR), there are companies across the globe that have done little, if anything, to avoid …

Chris Eng
Chris Eng: An infosec journey from offense to defense

“Come to my lab, I promise you’ll learn something cool,” a friend told Chris Eng. Within a couple of hours, he had walked him through writing an exploit for …

laptop
Secure remote browsing: A different approach to thwart ever-changing threats

A defense-in-depth strategy is essential to modern enterprises, and organizations must deepen their defenses as quickly as possible to fully protect themselves. One promising …

find
The impact of threat hunting on your security operations

The main goal of threat hunting is to find traces attackers have left behind in the organization’s IT environment. These traces can date back to already solved crises or …

gap
Another KRACK in the network perimeter

When a high profile vulnerability surfaces that is as far reaching as KRACK, a WPA2 encryption attack to hijack Wi-Fi networks, it’s common to respond impulsively. “Why are …

now
Why wait to be breached? Three reasons to secure your data now

“I’m working on it.” “We don’t have room in this year’s budget.” “Something else more important came up.” “Well, we’ve not been …

Degree
Four ways colleges can strengthen their cybersecurity programs

If breaches can’t be entirely blocked, what can IT professionals in higher education do to prevent these kinds of disaster scenarios? The GovEd team at Logicalis US says …

degree
Main cybersecurity problem for colleges? Gathering diverse kinds of data

Each time a major retailer, credit bureau or healthcare provider experiences a significant data breach, even the experts in cybersecurity circles wonder, “What could be …

traffic
Protecting networks from DNS exfiltration

Everyone around the globe has heard about the colossal Equifax breach last month. Its implications haven’t yet been fully calculated except now that the CEO has resigned from …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools