Companies struggle to deploy security for custom applications
As more and more companies migrate their application workloads from their datacenters to infrastructure-as-a-service (IaaS) platforms such as the Amazon Web Services (AWS) …
Metadata: The secret data trail
Every phone call, text message, even activated cell phones, leaves a trail of data across a network. In many cases this data is aggregated with other data and metadata …
Five ways to prevent data leaks
The story still strikes fear into the hearts of IT departments: As many as 70 million credit- and debit card accounts were compromised in less than a month during the Target …
Six critical customer support differentiators in cybersecurity
Regardless of size or sector, excellent customer support is a major differentiator within any organization. In the cybersecurity industry, however, tech support is more than a …
Why you need a tailored application security program
For companies that provide applications to their customers, keeping those applications secure is a must. Setting up an application security program is the next logical step, …
CSOs reveal true cost of breaches
Over one-third of organizations that experienced a breach in 2016 reported substantial customer, opportunity and revenue loss of more than 20 percent, according to the Cisco …
Six best practices for managing cyber alerts
Security professionals know that the number of cyber alerts is growing at a frantic pace. Even a mid-sized company can face tens of thousands of alerts every month. As the …
Irregular application testing: App security in healthcare
Nearly half (45%) of NHS trusts scan for application vulnerabilities just once a year, with less only 8% doing so on a daily basis, according to Veracode. This potentially …
Is it time to call an MSSP? Five signs that it can’t wait
Small and midsize businesses (SMBs) are fighting an uphill battle when it comes to managing their network security. According to a 2016 Ponemon study, 69 percent of SMBs don’t …
Half of IT pros don’t know how to improve their security posture
Mid-market enterprises have high confidence in their cybersecurity defenses, but they struggle to defend against malicious activity that has become more sophisticated and …
Most organizations are unaware of daily malicious activity
A new DomainTools survey of more than 550 security analysts, IT managers, and executives revealed that the majority of organizations are struggling to monitor and prevent …
Security budgets shifting from prevention to detection
According to industry estimates, enterprises have historically spent more than 75% of their infosec technology budgets on preventative technologies. According to a new survey …
Featured news
Resources
Don't miss
- Banshee Stealer variant targets Russian-speaking macOS users
- Ivanti Connect Secure zero-day exploited since mid-December (CVE-2025-0282)
- GitLab CISO on proactive monitoring and metrics for DevSecOps success
- Sara: Open-source RouterOS security inspector
- Cybersecurity in 2025: Global conflict, grown-up AI, and the wisdom of the crowd