Features

KPN CISO paints a greater security picture
Being the CISO of such a huge and diverse company as KPN, the Netherlands’ largest telecom and ISP provider, requires great determination, and the current holder of the …

Getting a start on cyber threat hunting
In this age of advanced persistent threats, waiting for traditional threat management solutions like IDS and SIEM to flag incidents and threats is simply not enough anymore. …

Learning from success: Brian Honan’s infosec journey
When Brian Honan started his information security consultancy thirteen years ago, most of his conversations were with those in charge of IT and/or IT security within an …

Enterprise security culture: Why you need it, and how to create it
Security awareness is a term that most information security professionals are familiar with – security culture a little less so. “Security awareness training is …

Creating the security operations center of the future with Siemplify
Security operations teams are engaged in a constant struggle to keep up with the volume of security alerts, maintain the right skills, and manage incident response processes. …

The future of macOS security: Baked-in protection and third-party tools
Anyone in the information security industry who’s interested in Mac security probably knows who Patrick Wardle is. Apart from being Chief Security Researcher at Synack, …

The role of web filtering in a modern security architecture
In its most basic and simplest form, filtering access to content on the web can be achieved by rather blunt instruments such as DNS black-holes. And, in the early 2000s, this …

Why companies shouldn’t dread the advent of GDPR
The main aim of the General Data Protection Regulation (GDPR) is to make sure that the data of EU citizens is protected, no matter where it’s held. The regulation, which will …

What’s an IT architect, and could you become one?
If you’re a Computer Science student or an IT professional looking for a new job that’s interesting, well paid, and for which demand is constant, you might want to …

Software security assurance: Everybody’s invited
As more and more things in this world of ours run on software, software security assurance – i.e. confidence that software is free from vulnerabilities (either …

Security awareness is good, but good security culture is better
As an efficient mechanism to influence employee behavior, security culture is one of the most important, yet most overlooked, aspects of organizational security. “A …

Executive spotlight: iovation’s new Vice President of Product
Last week iovation announced that Dwayne Melancon was leaving Tripwire after 17 years and joining the company as the new Vice President of Product, so we decided to get in …
Featured news
Sponsored
Don't miss
- Meta introduces default end-to-end encryption for Messenger and Facebook
- New RCE vulnerability in Apache Struts 2 fixed, upgrade ASAP (CVE-2023-50164)
- December 2023 Patch Tuesday forecast: ‘Tis the season for vigilance
- Aim for a modern data security approach
- Short-term AWS access tokens allow attackers to linger for a longer while