Expert analysis
Four ways organizations can prevent PII from becoming black market public record
Personally Identifiable Information (PII) is worth 10 times more than credit card information on the black market, making it imperative to have strong policies and safeguards …
Understanding a new security market: User behavior analytics
We know that tracking enterprise log data to discover suspicious activity from hackers or malicious insider threats is not a new idea. Five to 10 years ago, we saw the SIEM …
Cyber operational readiness and a complex threat landscape
Mike Walls is the Managing Director, Security Operations and Analysis at EdgeWave. In this interview he discusses keeping pace with an increasingly complex threat landscape, …
Software-Defined Perimeter enables application-specific access control
Back in the early 1990s enterprises migrated away from proprietary protocols such as DECnet, SNA, and Novell IPX to common standards such as IP. The motivation was the open …
Real-world roadblocks to implementing CISA
The recent approval of CISA (the Cybersecurity Information Sharing Act) by the US Congress and Senate is paving the way for broader security collaboration. There is a rapidly …
Creating a secure network for the Internet of Things
The attitudes and perceptions around the Internet of Things (IoT) span a wide array of views from the extreme excitement of consumers and manufacturers, to the concerns …
The top 6 scariest cloud security mistakes and how to avoid them
As Halloween approaches, the only thing more frightening than a house of horrors is a security threat to your enterprise cloud system. One slip-up could not only be …
What should companies do after a wide-scale data breach?
It is not always possible to prevent such attacks, however, it is possible to make them highly unlikely to succeed. It is also possible to limit the extent of possible damage …
Employee activities that every security team should monitor
Next time you are at a cocktail party with a group of IT security professionals, try this icebreaker – “Which of the following user activities could open the door to a data …
Why everyone should care about two-factor authentication
In the age of BYOD, corporate employees and consumers alike have access to incredible computing power in the palms of their hands. With almost our entire digital lives …
Internet of Things: Rethinking privacy and information sharing
It is hard to imagine a world where the Internet of Things (IoT) is our collective “normal” – when our interaction with devices around us is so embedded in our lives, how we …
We’ve been hacked! Okay, I’ll deal with it next week
That was the message I got from a CEO when we presented evidence that their organization had been compromised and the attackers had been free to roam for months, resulting in …
Featured news
Resources
Don't miss
- August 2025 Patch Tuesday forecast: Try, try again
- Third-party partners or ticking time bombs?
- What GPT‑5 means for IT teams, devs, and the future of AI at work
- Microsoft urges admins to plug severe Exchange security hole (CVE-2025-53786)
- SonicWall: Attackers did not exploit zero-day vulnerability to compromise Gen 7 firewalls