Please turn on your JavaScript for this page to function normally.
C-level executives are less confident than their boards or IT execs

A new Dimensional Research study examined corporate executives’ view of cybersecurity risks, as well as measured their confidence and preparedness in the event of a security …

sign
High-profile data breaches made most CEOs re-examine security programs

There has been increased board- and C-level interest in information security programs in light of recent high-profile data breaches such as those affecting Sony, Anthem and JP …

The key challenges to timely incident response

Security professionals are inundated with security incidents, averaging 78 investigations per organization in the last year, with 28 percent of those incidents involving …

Boards must up their game before the hackers claim checkmate

In today’s climate, the cyber security paradigm is a reactive cycle. When a threat is uncovered, it is examined and a counter-measure is created, with response times …

I don’t need friends, I have followers

Admittedly, I didn’t really mean to utter those words but found them coming out of my mouth nonetheless. Well what else do you say when an eight year old ridicules you …

10 practical security tips for DevOps

More organizations are embracing DevOps and automation to realize compelling business benefits, such as more frequent feature releases, increased application stability, and …

Banks and IT security: The elements of success

In this interview, Nathan Horn-Mitchem, VP, Information Security Officer at Provident Bank, talks about delivering and maintaining IT security for 80 branches of the bank, …

Implementing an effective risk management framework

In today’s marketplace, almost every employee is now a content contributor. Although beneficial to the collective of information available, this influx brings about new …

Four advantages of an identity behavior-based approach to cybersecurity

With an ever-increasing number of data breaches, more money is being poured into IT security budgets. According to Gartner, the average global security budget increased 8 …

Protecting the critical infrastructure: Strategies, challenges and regulation

In this interview, Raj Samani, VP and CTO EMEA at Intel Security, talks about successful information security strategies aimed at the critical infrastructure, government …

Why senior managers need to be involved in data security

The networking environment has changed radically in recent times. In today’s world of increasing wireless use, widespread BYOD, more home working, more remote access, …

Do smart machines require ethical programming?

Realizing the potential of smart machines — and ensuring successful outcomes for the businesses that rely on them — will hinge on how trusted smart machines are and how well …

Don't miss

Cybersecurity news