Please turn on your JavaScript for this page to function normally.
critical infrastructure
Tech businesses must rethink their IT infrastructure

Working life has changed drastically in recent months. Speedy digital transformation has been critical for business continuity and has been driving growth even during these …

red
Key cybersecurity industry challenges in the next five years

What key challenges will the cybersecurity industry be dealing with in the next five years? Pete Herzog, Managing Director at ISECOM, is so sure that artificial intelligence …

SIEM
How do I select a SIEM solution for my business?

A Security Information and Event Management (SIEM) solution collects and analyzes activity from numerous resources across your IT infrastructure. A SIEM can provide …

danger
Ransomware perspectives: The shape of things to come

Michael Hamilton, CISO of CI Security, has worked in the information security industry for 30 years. As former CISO for the City of Seattle, he managed information security …

mobile security
How do I select a mobile security solution for my business?

The percentage of companies admitting to suffering a mobile-related compromise has grown, despite a higher percentage of organizations deciding not to sacrifice the security …

Qualys
Keep remote workers and their devices secure with one click

In this interview for Help Net Security, Shailesh Athalye, VP Compliance at Qualys, discusses cloud-based Remote Endpoint Protection and illustrates how security teams can …

security awareness
How do I select a security awareness solution for my business?

“Great security awareness training, that is part of a healthy cyber security culture and that is aimed at encouraging positive security behaviours, is essential. The …

(IN)SECURE Magazine 66
(IN)SECURE Magazine issue 66 released

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 66 has been released today. It’s a free …

tech
New infosec products of the week: June 12, 2020

Qualys Remote Endpoint Protection gets malware detection, free for 60 days Powered by the Qualys Platform and Cloud Agent, malware detection in Remote Endpoint Protection uses …

Microsoft OneDrive
5 keys to protecting OneDrive users

With the dramatic shift toward remote workforces over the last three months, many organizations are relying more heavily on cloud tools and application suites. One of the most …

Code
New infosec products of the week: June 5, 2020

Checkmarx SCA: New SaaS-based software composition analysis solution CxSCA leverages Checkmarx’s source code analysis and automation capabilities, empowering security and …

5G
5G adoption, security and worldwide market trends

With 5G adoption ramping up all over the world, we sat down with Chris Pearson, President of 5G Americas, to learn more about the current 5G landscape. 5G Americas is an …

Don't miss

Cybersecurity news