Please turn on your JavaScript for this page to function normally.
person
Early detection of compromised credentials can greatly reduce impact of attacks

According to Blueliv’s credential detection data, since the start of 2018 there has been a 39% increase in the number of compromised credentials detected from Europe and …

handshake
How security leaders can be empowered to drive results

The overwhelming demands on security leaders today can have a paralyzing effect. Gartner analysts provided guidance to security and risk leaders and practitioners on how to be …

risk
Quantifying cyber exposure: Attackers are racing ahead

Cybercriminals have a median seven-day window of opportunity during which they can exploit a vulnerability to attack their victims, potentially siphoning sensitive data, …

editor
The percentage of open source code in proprietary apps is rising

The number of open source components in the codebase of proprietary applications keeps rising and with it the risk of those apps being compromised by attackers leveraging …

spotlight
Half of all companies do not have adequate application security visibility

The Ponemon Institute surveyed nearly 1,400 IT and IT security practitioners in the United States, European Union and Asia-Pacific to understand the risk unprotected …

glasses
Cyber risk assessment and disclosure requirements: What’s important to you?

In this podcast recorded at RSA Conference 2018, Jerry Caponera, VP cyber risk strategy at Nehemiah Security, offers some interesting thoughts on cyber risk assessment and …

Absolute
Solving the dark endpoint problem with increased visibility and control

In this podcast recorded at RSA Conference 2018, Richard Henderson, Global Security Strategist at Absolute Software, and Todd Wakerley, EVP of Product Development at Absolute …

market
Largest inhibitor of cyber insurance market growth? Silent cyber risk

A new study of the UK cyber risk insurance and broker community reveals startling findings. First and foremost, the insurance industry needs to address non-affirmative cyber …

door
Expand vulnerability and risk management programs to eliminate security misconfigurations

In this podcast recorded at RSA Conference 2018, Tim White, Director of Product Management, Policy Compliance at Qualys, discusses how expanding vulnerability and risk …

money
Steps executives are taking to increase security while launching new ways to pay

More than 80 percent of organizations that have been impacted by a data breach have introduced a new security framework and 79 percent have reduced employee access to customer …

tunnel
Compliance functions make a turn towards innovation-fueled strategies

Faced with growing threats of ‘industry shocks’ such as cyber fraud, cryptocurrency, quantum computing and open banking, financial institutions expect to increase their …

CR2
New coalition aims to advance cybersecurity across sectors, around the world

Six global organizations have joined together to launch The Coalition to Reduce Cyber Risk (CR²). CR² members, including AT&T, Cisco, HSBC, JPMorgan Chase, Mastercard and …

Don't miss

Cybersecurity news