Please turn on your JavaScript for this page to function normally.
hand
Which countermeasures improve security and which are a waste of money?

If you want to know about which cyber defenses are most effective and which are a waste of money and resources, ask a hacker. And that’s just what Nuix researchers did. …

person
Insider threat vs. inside threat: Redefining the term

The traditional meaning of “insider threat” is: a current employee or contractor who, intentionally or accidentally, misuses his or her authorized access to a secure network …

Business ideas
The time to fortify your organization against CNP fraud is now

When it comes to EMV (Europay, MasterCard and Visa) security chip adoption, the United States is the clear laggard. According to EMVCo, only 7.2% of “card present” …

corporate cloud
Companies struggle to deploy security for custom applications

As more and more companies migrate their application workloads from their datacenters to infrastructure-as-a-service (IaaS) platforms such as the Amazon Web Services (AWS) …

data
Metadata: The secret data trail

Every phone call, text message, even activated cell phones, leaves a trail of data across a network. In many cases this data is aggregated with other data and metadata …

fence
Five ways to prevent data leaks

The story still strikes fear into the hearts of IT departments: As many as 70 million credit- and debit card accounts were compromised in less than a month during the Target …

User
Six critical customer support differentiators in cybersecurity

Regardless of size or sector, excellent customer support is a major differentiator within any organization. In the cybersecurity industry, however, tech support is more than a …

gear
Why you need a tailored application security program

For companies that provide applications to their customers, keeping those applications secure is a must. Setting up an application security program is the next logical step, …

money
CSOs reveal true cost of breaches

Over one-third of organizations that experienced a breach in 2016 reported substantial customer, opportunity and revenue loss of more than 20 percent, according to the Cisco …

alert
Six best practices for managing cyber alerts

Security professionals know that the number of cyber alerts is growing at a frantic pace. Even a mid-sized company can face tens of thousands of alerts every month. As the …

labyrinth
Irregular application testing: App security in healthcare

Nearly half (45%) of NHS trusts scan for application vulnerabilities just once a year, with less only 8% doing so on a daily basis, according to Veracode. This potentially …

shield
Is it time to call an MSSP? Five signs that it can’t wait

Small and midsize businesses (SMBs) are fighting an uphill battle when it comes to managing their network security. According to a 2016 Ponemon study, 69 percent of SMBs don’t …

Don't miss

Cybersecurity news