Please turn on your JavaScript for this page to function normally.
hospital
How to reduce the attack surface associated with medical devices

As the number of connected medical devices continues to rise, so does healthcare organizations’ attack surface. “Most medical devices available in the healthcare system today …

idea
CISO priorities: Implementing security from the get-go

Dr. David Brumley, CEO of ForAllSecure, a Carnegie Mellon computer science professor (on leave), and part of the team that won the DARPA Cyber Grand Challenge, was, at one …

CCPA
Automating CCPA compliance: Organize your data and manage requests

Time is running out for California-based businesses to prepare for the California Consumer Privacy Act (CCPA), which goes into effect on January 1, 2020. Despite the Act being …

keyboard
Pitfalls to avoid when improving your software development skills

The dizzying pace of technological change makes knowledge acquisition and skill development a very big deal in the IT and IT security industry. Luckily, the opportunities for …

cloud
Embracing the cloud and meeting its security demands

If you want to build a career in information security, there’s no shortage of diverse roles you can aim for. Whether you’ll end up doing that or something else …

chess
Solving security problems: Security advice for those with limited resources

In this interview, Mark Sangster, VP & Industry Security Strategist at eSentire, gives SMBs advice on how to minimize the risk of a data breach through better security …

Cloud adoption and security are not mutually exclusive

As organizations continue to adopt cloud services to achieve their desired business objectives, many don’t realize that the thing that makes cloud computing great – …

keyboard
The dynamic of modern security challenges: Issues security leaders face today

We sat down with Neil Weicher, CTO & Founder, NetLib Security, to discuss encryption technologies, the threat of legacy applications, the complexity of cloud security, …

Healthcare IoT
Healthcare’s blind spot: Unmanaged IoT and medical devices

From imaging to monitoring systems, infusion pumps to therapeutic lasers and life support machines, medical devices are used to improve and streamline patient care. Many of …

identity
True passwordless authentication is still quite a while away

The password has been one of the great inventions in the history of computing: a solution that allowed simple and effective identity and access management when the need arose …

tools
Do you have what it takes to be a hardware hacker?

If you ask Yago Hansen, a hacker specialized in Wi-Fi and RF security, curiosity and a willingness to learn and improve your skills are the two things that you absolutely must …

face
Inside the NIST team working to make cybersecurity more user-friendly

Cybersecurity is usually not a user’s primary duty, yet they suffer an increasing burden to respond to security warnings, maintain many complex passwords, and make security …

Don't miss

Cybersecurity news