Is trading resilience for business growth a smart strategy?
Not long ago, the probability of a threat materializing was enough to open the IT pocketbook. Today, the mentality has shifted from one of risk prevention to one of risk …
How GDPR affects your organization
The countdown is on and global businesses now have just six months until the General Data Protection Regulation (GDPR) is enforced. A recent study from Trend Micro has found …
Top 10 ways to fund the shift to digital business
With many options for digital business transformation requiring significant investment, Gartner has identified the top 10 ways to fund the shift to digital business. According …
Security, privacy issues we need to solve before non-medical implants become pervasive
The cybernetic revolution is happening, and it’s imperative that civil liberties and privacy issues are addressed by system designers, innovators, regulators, and …
Tor Browser flaw leaks users’ real IP address
The Tor Project has issued an emergency security bugfix release of Tor Browser, to prevent user IP address leakage due to a still unpatched Firefox bug. The bug is present …
Infosec expert viewpoint: Vulnerability patching
Vulnerability patching is one of the most useful and cost-effective methods to mitigate a plethora of security threats. Here’s what infosec experts think about the …
Modernizing cybersecurity training for the next generation
Equifax, Verizon, Molina Healthcare, Deloitte, Whole Foods, Wendy’s… it seems like every time we turn on the television another high-profile data breach is being …
The evolution of BYOD security in a mobile-first world
Bitglass’ research team surveyed 200 IT and security professionals at a national Gartner conference to learn more about the evolution of BYOD security in a mobile-first world. …
GDPR to have limited impact on M&A activity
Dealmakers believe that the new General Data Protection Regulation (GDPR) will likely only have a modest impact on M&A activity in the EU, according to a recent survey …
Ten important shifts impacting IT organizations over the next 36 months
As digitally-fueled disruptors continue to roil and reshape businesses and industries, the clear mandate for every enterprise is to reimagine and reconstruct itself to compete …
Week in review: Estonia blocks certificates on ID cards, Chrome extension steals all data
Here’s an overview of some of last week’s most interesting news and articles: Chris Eng: An infosec journey from offense to defense “Come to my lab, I promise …
Crooks poison results for financial-related searches to deliver banking malware
Cyber crooks are using a clever approach to deliver banking malware to the right victims: they are poisoning the search results for specific banking-related keywords. The …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments