Why identity is the foundation of security
Once upon a time, companies secured their valuable information by locking file cabinets and installing passwords and firewalls around databases and systems in office-based …
Cybersecurity crisis communication: How to do it well
Riviera Beach is one of the several cities and towns in Florida which have recently been hit with ransomware. Its local government, like that of Lake City before it, decided …
Business security in the age of malicious bots
As most technologies, bots can be used for good and bad purposes, and the information security industry is doing its best to minimize the adverse effects of the latter …
How the healthcare industry can improve online trust
Privacy on the internet is important in all industries, but none more so than the healthcare sector, which handles mass amounts of online health data daily. While any data …
Bringing more talented individuals into the security industry
In this interview, Tony Vizza, Director of Cybersecurity Advocacy, Asia-Pacific, (ISC)2, talks about the growing information security skills shortage, the importance of …
The biggest SecOps burdens hindering progress for enterprises and MSSPs
Only 16% of security operations professionals think that their SecOps programs have reached the highest maturity level, according to a Siemplify and Cyentia Institute study. …
Cybersecurity professionals are outgunned and burned out
Nearly half (48 percent total) of cybersecurity leaders across France, Germany and the UK believe their teams are falling behind in the skills race against would-be cyber …
When it comes to cybersecurity, perfection is the enemy of progress
In information security, perfection is the enemy of progress, says Lenny Zeltser, VP of Product at Axonius. But it’s one thing to know about this maxim, and another to …
Where are organizations stalling with cybersecurity best practices?
UK organizations are failing to make progress towards strong cybersecurity and are facing paralysis as cybercriminals become more advanced, according to NTT Security. …
Anatomy of a ransomware attack: How attackers gain access to unstructured data
Ransomware isn’t a new phenomenon, but it’s effects are starting to be felt more widely, and more deeply than ever before. Behemoths like Sony, Nissan, FedEx, Kraft Foods and …
Why simplifying cybersecurity is essential for mutual fund boards of directors
Imagine if you were tasked with the understanding of an element of your job outside of your job description, and that the understanding of this element, if not done correctly, …
Cloud security exacerbated by immature security practices
Enterprises are struggling to keep up with the rapid expansion of cloud within their businesses, according to Symantec. Surveying 1,250 security decision makers across the …
Featured news
Resources
Don't miss
- The modern CISO is a cornerstone of organizational success
- Best practices for ensuring a secure browsing environment
- Kata Containers: Open-source container runtime, building lightweight VMs
- Why software is the key to FI risk management
- Hottest cybersecurity open-source tools of the month: December 2024