
Making sense of threat intelligence data in your IT environment
Threat intelligence data has been growing at an exponential rate of 39% a month. Enterprise customers are looking at around 30,000 events going into their SIEM every second. …

Start getting ready for Europe’s new data protection regulation today
You are in charge of your organization’s security. Depending on how large and well resourced your business IT function is, your card might read IT director, CIO, CTO, or …

Deep and Dark Web: Complexity and escalating cybercriminal activity
Flashpoint released an annual research report that looks to uncover the growing complexity of illicit communities and the industrialization of cybercrime over the past year. …

Coalition aims to educate policymakers on cybersecurity
A group of vendors launched the Coalition for Cybersecurity Policy and Law, a new organization that will focus on education and collaboration with policymakers on the …

Why the C-suite should care about cybersecurity
Many leaders across the C-suite are confused about who the true cybersecurity adversary is and how to effectively combat them. IBM Security interviewed CxOs, from 28 …

Fighting malware monetization and application vulnerabilities
As the traditional network perimeter disappears and attack surfaces grow, security professionals are challenged with protecting users, applications and data – without …

Review: Mobile Data Loss
Employees increasingly use mobile devices for work and to access their company’s resources. That should be, by now, an accepted reality for all those who work in the IT …

Kotlin programming language for JVM and Android reaches version 1.0
Kotlin is an open source programming language for JVM and Android that combines OO and functional features and is focused on interoperability, safety, clarity and tooling …

Security guidance for the Internet of Things
Embedded systems and connected devices are already deeply woven into the fabric of our lives, and the footprint is expanding at a staggering rate. Gartner estimates that 4.9 …

Anonymous networks 101: Into the heart of the Darknet
Here’s a riddle: What’s hidden in plain sight Stretches the entire known world Vilified and Adored Born from a secret US Government project Maintains secret societies Requires …

Know your enemy: The most popular hacking methods
Outsiders want to become insiders with the least possible effort, and insiders help them do so – mostly accidentally, according to Balabit. 54% of the survey respondents …

IoT security guidelines for providers, vendors, and network operators
The GSMA Association has published new guidelines designed to promote the secure development and deployment of services in the growing Internet of Things (IoT) market. …
Featured news
Resources
Don't miss
- NetScaler ADC/Gateway zero-day exploited by attackers (CVE-2025-7775)
- Git vulnerability leading to RCE is being exploited by attackers (CVE-2025-48384)
- Protecting farms from hackers: A Q&A with John Deere’s Deputy CISO
- LLMs at the edge: Rethinking how IoT devices talk and act
- How to build a secure AI culture without shutting people down