Please turn on your JavaScript for this page to function normally.
mobile
Risky business: Are mobile employees compromising business info?

Americans logged 457.4 million trips for business in 2016, and there is no sign of business travel slowing down, with global business travel spend expected to rise 5.8 percent …

lights
Leveraging security analytics to investigate and hunt modern threats

In this interview, Gary Golomb, co-founder at Awake Security, talks about how machine learning help develop a scalable enterprise cybersecurity plan, what technologies can …

abstract
Are SMBs driving the adoption of security automation by enterprises?

If you tracked the lifecycle of new security technologies, you’d likely see that most start as enterprise solutions and eventually trickle down to small and medium-sized …

patch
May 2018 Patch Tuesday forecast: Where are the flowers?

The wintry weather doesn’t want to give up its hold on us here in the US. The extended cold has kept the spring flowers from blooming, dragging out the winter blues. It …

business
A smooth transition to the cloud is possible with identity governance

It comes as no surprise that organizations large and small are considering adopting the cloud as part of their overall IT strategy. The variety of impressive benefits that the …

password
Password behaviors remain largely unchanged

Despite today’s increased threat landscape and heightened global awareness of hacking and data breaches, password behaviors remain largely unchanged. Data from a survey …

mobile user
Most top travel websites fail to protect user security

Dashlane examined password and account security on 55 of the world’s most popular travel-related sites, and found that 89% of sites leave their users’ accounts perilously …

traffic
Do public clouds make it more difficult to get visibility into data traffic?

The second annual Ixia 2018 Security Report analyzes how enterprise network attack surfaces are increasing as the perimeter of the traditional network expands into the cloud. …

bot
Public breaches drive increase in account takeover attempts

Distil Networks released The 2018 Anatomy of Account Takeover Attacks Report, based on data from 600 domains that include login pages. The study revealed that all monitored …

architecture
Why good security foundations are better than the best security mitigation

Since founding VDOO, we have been working to analyze a great many IoT devices, in the broadest way possible. The more we look into these devices and find their …

GDPR
Unsurprisingly, most won’t be ready for GDPR on 25th May

With less than a month until the GDPR comes into force, many companies will not be ready when it takes effect on May 25th, 2018. 62% of IT Decision Makers (ITDMs) surveyed …

organize
Only half of CI/CD workflows include appsec testing elements

Only half of CI/CD workflows include application security testing elements despite respondents citing awareness of the importance and advantages of doing so, according to a …

Don't miss

Cybersecurity news