Security priorities are shifting in response to increased cybersecurity complexity
The increased complexity of the IT environment, combined with increasingly sophisticated attacks and a rapidly evolving threat landscape, is causing organizations to invest …
Malicious hacking activity increasingly targeting critical infrastructure
In this podcast, Andrew Ginter, VP of Industrial Security at Waterfall Security Solutions, and Edward Amoroso, CEO of TAG Cyber, talk about how the traditional focus of most …
Key weapon for closing IoT-era cybersecurity gaps? Artificial intelligence
As businesses struggle to combat increasingly sophisticated cybersecurity attacks, the severity of which is exacerbated by both the vanishing IT perimeters in today’s mobile …
Awareness and tendency towards risky online behavior
Spanning Cloud Apps announced the results of a survey of over 400 full-time U.S. employees on their awareness of and tendency towards risky online behavior. The study …
Data privacy automation: Unlock your most valuable asset
In years past, data privacy was the purview of the chief privacy officer. However, increasingly, CTOs are being tasked with operationalizing a data privacy solution for the …
Hackers wage a new Cold War
The Cold War of the mid-twentieth century played out as a truly epic conflict. The U.S. and the Soviet Union mobilized spies across the globe, supported proxy armies from the …
Phished credentials caused twice as many breaches than malware in the past year
Personal device use for remote work poses the biggest security risk to organisations safeguarding their increasingly mobile and cloud-based IT environment, according to a new …
What can we do to reverse the cybersecurity skills shortage?
An ever widening cybersecurity skills gap is making comprehensive cyber security protection – based on a combination of the latest tools and internal expertise – …
How metrics can enhance the effectiveness of security programs
For anyone responsible for maintaining their organization’s security posture, the findings from the SANS 2018 Security Operations Center (SOC) Survey should come as no …
How leadership implements cyber resiliency across their organizations
A majority of executives around the world feel they face a “specialist-generalist” dilemma as to whom leads on cyber resiliency due to its critical nature across …
IT security teams are being locked out of IoT projects
Trend Micro revealed that organizations around the world are exposing themselves to unnecessary cyber risk by failing to give IT security teams a voice when planning IoT …
There are no real shortcuts to most security problems
For Xerox Chief Information Security Officer Dr. Alissa Johnson, human ingenuity, partnerships and automation are the answer to most security problems the company has …