Please turn on your JavaScript for this page to function normally.
binary
Five key cybersecurity trends for 2016

The overwhelming shift to mobile and cloud computing among both businesses and consumers will see some surprising additions to the risk landscape in 2016. ISACA shares five …

Bitcoin
Blockchain transactions create risks for financial services

Trust is the most valuable commodity in the digital age. Failure to trust the systems or organizations in which we place our digital assets leads us to look at alternate …

EU flag
New EU rules on data protection put the citizen back in the driving seat

New EU data protection legislation, informally agreed on Tuesday and backed by Civil Liberties MEPs on Thursday morning, will create a uniform set of rules across the EU fit …

Abstract
Vision for a new generation of experimental cybersecurity research

How do cybersecurity experts discover how to properly defend a system or build a network that’s secure? As in other domains of science, this process involves hypothesis, …

Laptop
IT teams expect a nightmare during the holidays

Dealing with potential data loss will be the number one headache confronting IT professionals in the run up to the 2015 holiday season. Over one-third of IT professionals in …

Cloud lock
IT use of cloud surges to record heights

The cloud has reached the point where businesses are no longer debating whether or not to use cloud, but how pervasively they will use it. A new North Bridge survey shows …

network cables
Will 2016 be the year of the 100G network?

100G Ethernet networks will be deployed much faster and more broadly than previously expected. Based on the influence of new paradigms currently emerging like SDN, NFV, Big …

Volkswagen
Driving an industry towards secure code

The German government made an unprecedented move this week by issuing requirements for all new vehicles’ software to be made accessible to country regulators to ensure that …

RSA Conference
RSA Conference 2016: Connect to protect

RSA Conference, the premiere series of global events, once again sets the stage for the world to talk – and challenge – information security trends during the annual U.S. …

binary
New threats will demand new approaches such as micro-segmentation and quantum encryption

Leading security professionals around the world will adopt a new mindset in 2016, embracing advanced approaches such as micro-segmentation to counter increasingly …

Surge in global cloud application adoption

Cloud application adoption across all industries increased more than 71 percent in 2015, according to Bitglass. Their global report was compiled through an automated, …

Security
Rackspace CSO on security: It’s time to go back to the fundamentals

Although less sexy, it is time to get back to the fundamentals. And it is this call to action that forms the basis of my 2016 predictions. Simplify and streamline security: …

Don't miss

Cybersecurity news