ISO 27001: An overview of ISMS implementation process
Register for this webinar to learn: Family of ISO 27k standards – for what purpose should each standard be used 17 steps towards ISO 27001 certification Key benefits and …
Tips to avoid online scammers this holiday season
With Black Friday and Cyber Monday offers, often dramatically cutting prices for one day only, there will be many genuine deals to be had. The problem for many of us is how to …
Fighting malware, emerging threats and AI
Liran Tancman is the CEO of CyActive, a predictive cyber security company. In this interview he talks about fighting malware, emerging threats, artificial intelligence and the …
ENISA guidelines on cryptographic solutions
ENISA published two reports. “Algorithms, key size and parameters” is a reference document providing a set of guidelines to decision makers, in particular …
User behavior intelligence in the expanding supply chain
The Internet has dramatically increased the speed of commerce across the globe. Today, the interconnectedness of various businesses facilitates just-in-time manufacturing, …
ITIL and ISO 20000 problem management
Remember this situation? You’re running Windows. The blue screen forces you to reboot your PC. And then it happens again. Incident Management = reboot your PC. And your …
6 tips for protecting your Internet-connected devices
While Internet-connected devices are our window on the world, we don’t realize that for cybercriminals it could be their window into ours if we don’t secure our …
How the threat landscape is shaping the network security business
Pat Calhoun is the Senior Vice President & General Manager, Network Security, at McAfee. In this interview he talks about constructing the strategic direction for …
8 cybercrime trends that will shape IT
Cybersecurity created headlines and headaches in 2014, with large-scale data breaches at retail chains, attacks on data stored in the cloud and massive vulnerabilities …
Does cyber insurance help the CISO get a seat in the boardroom?
CISOs and cyber security leaders have long struggled to gain a voice in the boardroom. Shut out of leadership meetings and strategic decision-making, IT security has often …
Risk assessment benefits, best practices and pitfalls
Ryan Ward is CISO at Avatier. In this interview, he talks about the overlooked benefits of risk assessment, offers best practices for performing successful risk assessments, …
How to become an ISO 27001 / ISO 22301 consultant
If you are thinking about a career change, becoming an independent consultant for ISO 27001 and/or ISO 22301 certainly sounds like an attractive option. But what do you need …
Featured news
Resources
Don't miss
- Critical Control Web Panel vulnerability is actively exploited (CVE-2025-48703)
- 18 arrested in €300 million global credit card fraud scheme
- PortGPT: How researchers taught an AI to backport security patches automatically
- AI can flag the risk, but only humans can close the loop
- VulnRisk: Open-source vulnerability risk assessment platform