Please turn on your JavaScript for this page to function normally.
GDPR
Privacy awareness checklist for GDPR readiness

A little more than a year out from its effective date of May 25, 2018, the General Data Protection Regulation (GDPR) is undoubtedly on the minds of many of privacy …

world biohazard
Week in review: WannaCry disaster, SharePoint security, the importance of security culture

Here’s an overview of some of last week’s most interesting news and articles: Massive ransomware campaign spreading around the world like wildfire Organizations …

USA flag
Industry reactions to Trump’s executive order on cybersecurity

On Thursday, President Donald Trump signed a long-awaited executive order on cybersecurity. Mainly, the order requires a number of cybersecurity reviews across the various …

quantum
Advantages of quantum processing shown in head-to-head race

A prototype quantum processor repeatedly beat a traditional, classical processor in a race to solve a puzzle, figuring out a secret combination up to 100 times faster by using …

traffic
Digital transformation initiatives: What are you doing to get ahead?

Digital transformation initiatives are more successful when they have buy-in from across the business, according to Splunk. Progress with digital business transformation …

business
Keys to attracting and retaining cybersecurity talent

Federal agencies need to invest strategically and heavily in their benefits strategy if they’re going to successfully compete for cybersecurity talent, according to the …

rings
Data security disruptions can have cascading negative impacts

Nine in 10 global cybersecurity and risk experts believe that cyber risk is systemic and that simultaneous attacks on multiple companies are likely in 2017, according to AIG. …

numbers
Most companies falsely believe their Active Directory is secure

A majority of companies falsely believe their Active Directory (AD) is secure, according to a new survey conducted jointly by Skyport Systems and Redmond Magazine. The …

data
Cybersecurity analytics and operations: Need for automation and orchestration

New research from Enterprise Strategy Group (ESG) shows that when it comes to the evolution of Cybersecurity Analytics and Operations, 71% of respondent organizations find it …

road sign
Is remote access technology leaving you vulnerable?

Insider and third-party access are growing security threats facing organizations and enterprise IT systems, according to Bomgar. Proliferation of security issues Despite …

brain
In 5 years AI may replace pros in tasks within medicine, law and IT

CIOs have a major role to play in preparing businesses for the impact that artificial intelligence (AI) will have on business strategy and human employment. Gartner predicts …

Vera
SAP co-founder’s VC firm leads $15M investment in Vera

Vera announced a $15 million strategic investment led by HP-Ventures, the venture capital firm founded by of SAP Chairman, Hasso Plattner. Drawing from its third fund of €150 …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools