
Democracy for the Internet of Things
In the past I’ve written a number of times on the way that the IoT potentially changes the relationship between governments and their constituents – and a profound change that …

Alarming cloud encryption misconceptions revealed
Businesses have a high level of concern about the exposure of sensitive and regulated data in the cloud to security threats. Yet despite this, the majority of data owners …

1 in 5 executives take risks with sensitive data to meet regulatory demands
The Anti-Money Laundering Directive (AML), the EU-US Privacy Shield and the Market Abuse Directive (MAD) and Regulation (MAR) are the three biggest regulatory pressures across …

How identity and access management is critical in the digital transformation process
Digital transformation is a top priority and source of anxiety for enterprises, but the majority of IT decision makers have not completed technology deployments to address the …

Global cyber security leaders to gather in Berlin
A series of reports over the summer have shown not only that cybercrime is more persistent than ever, but there are also more opportunities. The growth of technology, …

Review: FourV Systems GreySpark
GreySpark is a solution for measuring and managing organizations’ IT security risk. GreySpark ingests information security metadata from a large range of existing …

Components of an effective vulnerability management process
Vulnerabilities continue to grab headlines. Whether it is a zero-day that affects “tens of millions” servers around the globe or an old unpatched flaw that leads to a data …

SOC 2 + HITRUST: Evolving infosec demands in healthcare
Two-thirds of business associates are not fully prepared to meet the growing marketplace demands regarding controls for protecting healthcare information, such as patient …

No more guilt about your lack of innovation in administrative IT
Helpdesks are mired in mundane tasks that are repeated every day – password resets, user account access and account creations, just to name a few. Manual tasks that really …

Security orchestration and automation: Closing the gap in incident response
Companies in North America are poised to increase their reliance on security orchestration and automation for incident response (IR), according to Enterprise Strategy Group …

A closer look at data breach preparedness
While most organizations have a data breach preparedness plan in place, executives are not updating or practicing the plan regularly and lack confidence in its effectiveness, …

Big Data investments are up, but fewer organizations plan to invest
Big Data investments continue to rise but are showing signs of contracting, according to Gartner. Their survey revealed that 48 percent of companies have invested in Big Data …
Featured news
Resources
Don't miss
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption
- NetBird: Open-source network security
- Burnout in cybersecurity: How CISOs can protect their teams (and themselves)