Three simple ways to prevent a data breach
With methods of cybercrime rapidly evolving, the number of headline-making data breaches continues to grow. Unfortunately, it has become clear that even advanced security …
How to evaluate the efficiency of a Data Loss Prevention solution
How do you measure the Return of Investment on Data Loss Prevention (DLP) technologies? How do you know that your DLP solution is efficient? In this podcast recorded at …
U.S. Open primer: In the cloud or on the golf course, hazards can be devastating
This week the U.S. Open heads to the Pacific Northwest for the very first time. Chambers Bay Golf Course in Washington State will play host. Anyone familiar with this course …
Relying on your insurer for security? Think again!
Data breaches are a regular occurrence, one need simply look at the papers to read about the myriad of breaches that have occurred over the last year. From the Sony attack in …
Insider threat: A crack in the organization wall
Vormetric announced the European findings of a survey conducted by Harris Poll in fall 2014 among 818 enterprise IT decision makers (ITDMs) in various countries, including 204 …
IoT developers concerned about privacy and data protection
An impressive 65 percent of Internet of Things (IoT) apps in production today are generating real revenue. The study results, undertaken by Progress and Harbor Research, also …
Why break in, if you can simply login?
I was asked the other day why so many security breaches are hitting the headlines and are seemingly getting larger and more frequent. The game of cyber security has changed …
Zero Trust approach to network security
Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.With Zero Trust there …
A call to researchers: Mix some creation with your destruction
Since I can first remember being interested in information security, my personal hacker heroes (and I’m using hacker positively here) were the researchers who discovered zero …
How data-centric security works
The traditional methods of how to address information security have all been for ages about protecting the perimeter and the network, protecting where the files are located. …
Instilling a culture of cyber security
Every company that sells cyber security technology markets how their tools will “defend”, “stop threats” and “protect”. There is no doubt that the technologies that exist …
How to develop effective honeypots
Honeypots – decoy systems used for learning cyber attackers’ capabilities and potential objectives – can be very useful to organizations, businesses, and …
Featured news
Resources
Don't miss
- NetScaler ADC/Gateway zero-day exploited by attackers (CVE-2025-7775)
- Git vulnerability leading to RCE is being exploited by attackers (CVE-2025-48384)
- Protecting farms from hackers: A Q&A with John Deere’s Deputy CISO
- LLMs at the edge: Rethinking how IoT devices talk and act
- How to build a secure AI culture without shutting people down