Please turn on your JavaScript for this page to function normally.
industry
The future of OT security in critical infrastructure

Both the likelihood and consequences of cyberattacks to OT/ICS components continue to grow for modern industrial operations. While current advances in OT/ICS cyber security …

Black Hat USA 2018
Photo gallery: Black Hat USA 2018, part 2

Black Hat USA 2018 is underway at Las Vegas. Here are a few photos from the Business Hall. Featured companies: LogRhythm, Carbon Black, Swimlane, Qualys, Cofense, Vectra, …

leak
A botnet of smart irrigation systems can deplete a city’s water supply

Ben-Gurion University of the Negev (BGU) cyber security researchers warn of a potential distributed attack against urban water services that uses a botnet of smart irrigation …

strategy
There’s a global divide in how organizations assess cyber risk

Nearly 48 percent of organizations globally have embraced strategic vulnerability assessment – defined as mature or moderately mature programs that include targeted and …

lock
Cyber hygiene: Where do organizations fall behind on basics?

Tripwire released its State of Cyber Hygiene report, which examined how organisations are implementing security controls that the Center for Internet Security (CIS) refers to …

Black Hat USA 2018
Photo gallery: Black Hat USA 2018

Black Hat USA 2018 is underway at Las Vegas. Here are a few photos from the Business Hall and the Arsenal. Featured companies: ZeroFOX, LogRhythm, Qualys, Rapid7, Irdeto, …

center
IoT security: Lessons we can learn from the evolution of road safety

I was recently chatting with my father about his life as a young boy growing up in rural Ireland in the middle of the last century, and the conversation moved onto cars and …

business
Nearly 15% of US security budgets go to remediating active compromises

Malwarebytes and Osterman Research have polled 900 senior IT decision-makers and IT security professionals in Australia, Germany, the US, UK, and Singapore about the impact of …

zero
Where should companies focus as they begin their machine learning journey?

As machine learning has become more widely adopted across industries, O’Reilly set out to learn more about how companies approach this work. By surveying more than 11,000 data …

DevSecOps
Only 8% of orgs have effective DevSecOps practices

92 percent of organizations struggle to implement security into the entire DevOps process despite most saying they want to do so – a staggering capability gap exposed in …

3d printing
The security issues 3D printing should solve before going mainstream

It’s always fun when you can mix your personal hobbies and interests with your profession, and often the passion you carry for the things you love can lead to valuable and …

artificial intelligence
Most IT decision makers believe AI is the silver bullet to cybersecurity challenges

New research from ESET reveals that three in four IT decision makers (75%) believe that AI and ML are the silver bullet to solving their cybersecurity challenges. In the past …

Don't miss

Cybersecurity news