Expert analysis

User behavior analytics: The equalizer for under-staffed security teams
In a perfect world, security professionals would see a few alerts, recognize the pattern, identify the malware and the hacker, and solve the problem – all with only a few …

Wi-Fi and security are better together for SMBs
Wireless adoption is growing fast globally, with Wi-Fi access becoming ubiquitous in businesses, stores, corporate environments and public spaces; literally everywhere we go. …

You can’t stop what you can’t see: Mitigating third-party vendor risk
Third-party vendors are a liability for host organizations, often unwittingly creating backdoors and exposing sensitive data. In fact, according to the Ponemon Institute …

An Internet of Things wish list for 2016
I’ve been writing about the Internet of Things for a while now, both from the perspective of the great opportunities that the IoT offers and the very real pressure it will put …

Demanding accountability: The need for cyber liability
GCHQ director Robert Hannigan pulled no punches last month when he stated that the free market is failing cybersecurity. And with 90% of large organisations and 74% of small …

Will IT security be different next year?
It is that time of the year again where we delve into the back of the cupboard and dust off the crystal ball as we make our predictions for the year ahead. This annual ritual …

Facebook drops Flash, adding one more reason for users to stop using it altogether
Facebook recently announced it stopped using Adobe Flash for web videos that appear on its News Feed, Pages and the embedded Facebook video player, instead deploying a video …

Top trends that will influence your security decisions in 2016
With 2016 almost here, many of us are making critical decisions regarding new security projects. Determining just where to focus and spend our limited resources is never easy, …

Blockchain transactions create risks for financial services
Trust is the most valuable commodity in the digital age. Failure to trust the systems or organizations in which we place our digital assets leads us to look at alternate …

Driving an industry towards secure code
The German government made an unprecedented move this week by issuing requirements for all new vehicles’ software to be made accessible to country regulators to ensure that …

Rackspace CSO on security: It’s time to go back to the fundamentals
Although less sexy, it is time to get back to the fundamentals. And it is this call to action that forms the basis of my 2016 predictions. Simplify and streamline security: …

How to eliminate encryption silos
Working in the encryption business, you’ll quickly learn that there are a number of problems that organizations can run into while deploying the technology. The …
Featured news
Resources
Don't miss
- RCE flaw in tool for building AI agents exploited by attackers (CVE-2025-3248)
- Exploited: Vulnerability in software for managing Samsung digital displays (CVE-2024-7399)
- What a future without CVEs means for cyber defense
- What it really takes to build a resilient cyber program
- How cybercriminals exploit psychological triggers in social engineering attacks