Please turn on your JavaScript for this page to function normally.
Facebook security and privacy pitfalls

In this interview, Andrei Serbanoiu, Online Threats Researcher at Bitdefender, discusses Facebook security and privacy pitfalls, the dangers of sharing on the social network, …

Big Data security and privacy challenges

In this interview, Leighton Johnson, CTO, Senior Security Engineer for Information Security and Forensics Management Team (ISFMT), talks about how Big Data is transforming the …

Egnyte CSO details company security roadmap

In this podcast recorded at RSA Conference 2014, Kris Lahiri, CSO at Egnyte, talks about his security roadmap, which details the company’s plans to raise the global …

Cybersecurity concerns becoming a boardroom issue

The increasing frequency, sophistication, and business impact of cyber-attacks have pushed cybersecurity planning and protection from an operational concern of IT departments …

Security awareness training: Why it matters

Dr. Peter Lokhorst is Managing Director of InfoSecure BV, which is currently in seven countries and provides awareness training programs to international clients including …

Despite costs, organizations overlook new threats

A new generation of unknown security threats stemming from megatrends and technologies like BYOD, mobility, cloud computing, and Internet usage, as well as internal actions …

Most security pros concerned about missing threats between vulnerability scans

Continuous monitoring, whose roots lie with the U.S. government, addresses many of the challenges faced by traditional vulnerability management solutions and offers CISOs and …

Most organizations are unable to resolve a cyber attack

The lack of incident detection and investigation puts companies and their CISOs’ jobs at significant risk, according to a new Ponemon Institute study. In fact, when a …

Best practices to help prevent online data breaches

The Online Trust Alliance (OTA) recommended a series of best practices to help prevent online data breaches and other exploits. Leveraging preliminary year-end data from the …

Key security program and budget data for CISOs

Benchmarking against similar organizations provides IT leaders with powerful tools to analyze departmental performance and gain executive management support. Since no …

What are the building blocks of security culture?

In order to understand how to create security culture, it is important to know what it is and how we define it, so that we can look beyond the basics. Taking into …

Federal agency cloud adoption increases 400%

Tripwire announced the results of a survey on cloud security technology trends in the federal government. The survey evaluated the attitudes of more than 100 federal …

Don't miss

Cybersecurity news