
Is this the year SIEM goes over the cliff?
While this may not be the year that Security Information and Event Management (SIEM) solutions fall off of the cliff of relevancy into obsolete software land, they are slowly …

Sophisticated threats? It’s usually the basic ones that get you
To listen to the headlines, the threats we face today are so sophisticated and intense, they can only be evaded with the help of artificial intelligence and machine learning. …

AI will change the face of security, but is it still the stuff of sci-fi?
The technology industry has always had a big problem with hype, with marketing teams, analysts and the media alike tending to fixate on the next big thing that will …

Using behavior analysis to solve API security problems
When people think about complex security challenges, airport security might be the most familiar. The scope of challenges and implications of breaches are daunting. This is …

KPN CISO paints a greater security picture
Being the CISO of such a huge and diverse company as KPN, the Netherlands’ largest telecom and ISP provider, requires great determination, and the current holder of the …

How Equifax failed miserably at handling its data breach
A data breach, as conventional wisdom goes, can happen to anyone, but how an organization handles the fallout is what shows us if they care about users at all – and …

Syringe infusion pumps can be fiddled with by remote attackers
A syringe infusion pump used in acute care settings sports eight vulnerabilities, some of which could be exploited by remote attackers to impact the intended operation of the …

Consumers need to stay alert as skimming grows
The number of cards compromised at U.S. ATMs and merchants rose 39 percent in the first six months of 2017, compared to the same period in 2016, according to new data from …

Navigating GDPR in the mobile enterprise
Securing data and protecting privacy in a connected world is already a major challenge for any enterprise, and mobility only magnifies this challenge. Mobile devices are …

The real cost of alarm fatigue
One of the toughest challenges for an IT security team is managing and sifting through the deluge of security alerts that are created on a daily basis. Teams can waste …

The security status quo falls short with born-in-the-cloud software
Born-in-the-cloud software, pioneered by companies like Salesforce, are beginning to dominate the computing landscape. According to Gartner, by 2020, the cloud shift will …

Payment security: What are the biggest challenges?
With cybercrime on the increase, payment card security is increasingly a focus for companies and consumers alike. The Payment Card Industry Data Security Standard (PCI DSS) is …
Featured news
Resources
Don't miss
- ScamAgent shows how AI could power the next wave of scam calls
- Where security, DevOps, and data science finally meet on AI strategy
- Can AI make threat intelligence easier? One platform thinks so
- Hundreds of Salesforce customer orgs hit in clever attack with potentially huge blast radius
- 300k+ Plex Media Server instances still vulnerable to attack via CVE-2025-34158