Please turn on your JavaScript for this page to function normally.
icosahedral
Not everything is sophisticated, let’s keep it simple

I don’t have dandruff. But if I did, then I could use a new sophisticated formula to cure my condition. Whether the problem is dandruff or a malware-related threat, the term …

plan
Three keys to making technical debt manageable

Remember back to a time when you worked on a project in college or grade school. You’re pushing through the project, and there is one piece that’s completed, but you know if …

question
Six data security questions that every board needs to ask

As data breaches become a constant headline, data security should be a major concern for company boards everywhere. Unless a board member has been hired specifically to …

fire
Only 12% or organizations are likely to detect a sophisticated cyber attack

Organizations believe that today’s cyber threat landscape places them at high risk of cyber attacks. The EY survey of nearly 1,200 C-level leaders of the world’s …

cloud storage
5 cloud storage predictions for 2018

At this point, the cloud is old news. This does not, however, diminish its continuing impact on individuals and businesses worldwide. As cloud-based services strive towards …

AI
Most businesses to invest in artificial intelligence by 2020

Eighty-five per cent of senior executives plan to invest in artificial intelligence (AI) and the Internet of Things (IoT) by 2020, according to a new survey of UK digital …

fingerprint
Poor security habits are the ideal recipe for a breach

A Preempt survey of more than 200 employees (management level or above) from enterprise companies of 1000 or more people, found that businesses are left exposed by employees …

building
For strong unified communications security, behavioral analytics is critical

If there’s one thing security professionals should understand and acknowledge – whether they’re part of an organization’s multi-person IT security team or the CISO guiding …

ISACA
Are your enterprise leaders digitally literate?

Only 53 percent of surveyed business technology professionals believe their organization’s leadership is digitally literate, according to ISACA. The other 47 percent either …

connected house
Infosec expert viewpoint: IoT security initiatives

IoT went quickly from buzzword to mainstream, and connected devices have become common in households and enterprises around the globe. A worrying lack of regulation has fueled …

GDPR
Mobile devices present a significant risk for GDPR noncompliance

Accessing data from mobile devices presents a significant risk for GDPR noncompliance, according to Lookout. 84 percent of U.S. security and IT executives agree that personal …

EU GDPR Documentation Toolkit
Review: EU GDPR Documentation Toolkit

The General Data Protection Regulation (GDPR) aims to strengthen data protection for all individuals within the EU (citizens and residents). It was adopted in April 2016, and …

Don't miss

Cybersecurity news