Please turn on your JavaScript for this page to function normally.
idea
Five crucial ways to help keep a system safe from harm

We’re living in an incredible age of technology, invention and innovation. It’s hard to imagine that just a short time ago we couldn’t order groceries for delivery from …

Broken glass
66% of US law firms reported a breach in 2016

The majority of US-based law firms are not only exposed in a wide variety of areas, but in many cases, unaware of intrusion attempts. These findings were based on Logicforce …

money
How to create an effective application security budget

Inadequately secured software ranks amongst the most significant root cause issues in cybersecurity. The frequency and severity of attacks on the application layer is greater …

eye
Security’s blind spot: The long-term state of exception

It seems every major hack is accompanied by the pointing of fingers. And there are plenty of places to point them: the servers that weren’t patched, the retailer who hadn’t …

speed
How High-Tech Bridge uses machine learning

In this podcast, Ilia Kolochenko, CEO at High-Tech Bridge, talks about the difference between artificial intelligence and machine learning, and illustrates how his company …

locks
TLS security: Past, present and future

The Transport Layer Security (TLS) protocol as it stands today has evolved from the Secure Sockets Layer (SSL) protocol from Netscape Communications and the Private …

corporate cloud
Cloud IT infrastructure revenues grew 14.9% to $8 billion in 1Q17

Vendor revenue from sales of infrastructure products (server, storage, and Ethernet switch) for cloud IT, including public and private cloud, grew 14.9% year over year in the …

building
Week in review: NotPetya, Facebook to inspect private messages, new issue of (IN)SECURE

Here’s an overview of some of last week’s most interesting news and articles: With ransomware, pay up if you want to keep paying So there you are, staring at a …

risk
Do we live in a riskier world? C-suite and senior level experts weigh in

72 percent of global business leaders say they’re operating in a riskier world, spurred by increasingly regulated industries, advanced technology and rapid digitalization, …

hospital
The path to protecting health data: 10 steps to get started

The information in your medical records can be more valuable than your credit card numbers to a cybercriminal. Experts estimate healthcare data is 50 times more valuable to …

geometry
The next frontier of cyber governance: Achieving resilience in the wake of NotPetya

Earlier this week, several European nations experienced a widespread ransomware attack. Major international giants, such as Merck, WPP, Rosneft, and AP Moller-Maersk, …

cloud
Top cloud challenges: Security, compliance, and cost control

A new Fugue survey, fielded to over 300 IT operations professionals, executives, and developers, found that most respondents believe that the cloud is not living up to …

Don't miss

Cybersecurity news