How to close the security update gap
Security patching is hard and patch fatigue is real. So what can be done to make the process more simple, less disruptive, and more likely to be performed in a timely manner? …
Are legacy technologies a threat to EU’s telecom infrastructure?
Telecommunications is a key infrastructure based on how our society works. It constitutes the main instrument that allows our democracy and our EU core values such as freedom, …
The current state of USB data protection
Data protection, whether related to personal customer or patient information, is critical across virtually all industries. So how can organizations best protect their most …
Businesses suspect their mobile workers are being hacked
More than half (57%) of organisations suspect their mobile workers have been hacked or caused a mobile security issue in the last 12 months, according to the iPass Mobile …
Compliance functions make a turn towards innovation-fueled strategies
Faced with growing threats of ‘industry shocks’ such as cyber fraud, cryptocurrency, quantum computing and open banking, financial institutions expect to increase their …
Using deception to gain enterprise IoT attack visibility
The main lessons from attacks against Internet of Things (IoT) devices are to change default usernames and passwords, use longer passphrases to avoid brute force attacks, and …
Analysis of 560 incidents demonstrates need for cyber resilience
Many entities face the same types of security incidents – some are viewed as handling the incident well, and for some it’s a disruptive and costly lesson. The ones that fare …
Digital innovation held back as IT teams firefight security threats
43% of IT executives at European financial institutions reveal that fears of a cyber-attack keep them awake at night – two months before the GDPR comes into force, according …
Gartner unveils IT cost-optimization priority for CIOs
IT cost optimization in most organizations is now largely focused on business optimization rather than cost cutting, according to a recent survey by Gartner. Survey …
IT leaders wrestling hyper-converged infrastructure security
New research from WinMagic, surveying over 1,000 IT Decision Makers (ITDM) about hyper-converged infrastructure (HCI) has revealed flexibility (65%), performance (58%) and …
Meltdown and Spectre will delay patching for most organizations
Complexity and challenges associated with the Spectre and Meltdown patches will result in companies delaying future patch rollouts, according to Barkly. 72% of organizations …
The PCI SSC QIR program is changing to help merchants reduce risk
The PCI Security Standards Council (PCI SSC) announced new changes to the PCI Qualified Integrators and Resellers (QIR) Program in response to industry feedback and data …
Featured news
Resources
Don't miss
- SafeLine: Open-source web application firewall (WAF)
- Securing AI’s new frontier: Visibility, governance, and mitigating compliance risks
- Veeam plugs serious holes in Service Provider Console (CVE-2024-42448, CVE-2024-42449)
- Whitepaper: 9 traits of effective cybersecurity leaders of tomorrow
- Phishers send corrupted documents to bypass email security