Is cyber insurance worth the paper it’s written on?
Weighing up whether you think insurance is worth it, in any situation, depends to some extent on personal experience. You can see the value of protection far more clearly if …
Launch your own cybersecurity sprint: 30 days to improved security
Whether it’s well-publicized cyber attacks on government organizations or widespread ransomware that threatens to halt business operations, attackers continue to target …
Don’t let cybercrime hold your innovation to ransom
When things break, our natural instinct is to look for someone to blame. Why? Because nothing happens by accident. It’s either done on purpose, a casualty of neglect or lack …
Constant availability: Mission-critical business data challenges
In today’s world, consumers expect businesses to be always-on, but 24/7/365 availability – for both data and applications – comes with specific information …
Event-driven architecture to become essential skill
Achieving broad competence in event-driven IT will be a top three priority for the majority of global enterprise CIOs by 2020, according to Gartner. Defining an event-centric …
Five crucial ways to help keep a system safe from harm
We’re living in an incredible age of technology, invention and innovation. It’s hard to imagine that just a short time ago we couldn’t order groceries for delivery from …
Review: Advanced Persistent Security
About the authors Ira Winkler, CISSP is President of the Internet Security Advisors Group. He is considered one of the world’s most influential security professionals. Araceli …
How to create an effective application security budget
Inadequately secured software ranks amongst the most significant root cause issues in cybersecurity. The frequency and severity of attacks on the application layer is greater …
Security’s blind spot: The long-term state of exception
It seems every major hack is accompanied by the pointing of fingers. And there are plenty of places to point them: the servers that weren’t patched, the retailer who hadn’t …
The path to protecting health data: 10 steps to get started
The information in your medical records can be more valuable than your credit card numbers to a cybercriminal. Experts estimate healthcare data is 50 times more valuable to …
Making enterprise content management secure and scalable
Content is one of the most valuable commodities that any business owns. It’s the key driver of customer interactions, the foundation of core business processes, and it helps …
Most businesses will not put off cloud adoption because of security concerns
Businesses are pressing ahead with their digital transformation plans, despite fears of being hit by a cyber attack or data protection regulations. This is according to a new …
Featured news
Resources
Don't miss
- Cybersecurity in 2025: Global conflict, grown-up AI, and the wisdom of the crowd
- Ivanti Connect Secure zero-day exploited by attackers (CVE-2025-0282)
- The U.S. Cyber Trust Mark set to launch
- Mitel MiCollab, Oracle WebLogic Server vulnerabilities exploited by attackers
- Why an “all gas, no brakes” approach for AI use won’t work