cybersecurity

Considering an SD-WAN deployment? The best solution may already be in your network
When the internet goes down, business stops. Every business today relies on cloud applications to run day-to-day operations, including CRM applications like Salesforce, …

Strategies for expertly protecting industrial control systems
Andrew Ginter is the Vice President of Industrial Security at Waterfall Security Solutions. We sat down with him to learn more about his new book, Secure Operations …

Why security by design and security DevOps are so critical to success
The advances made in technology throughout the past several decades have brought about an inevitable digital transformation, which companies are experiencing in today’s world. …

Most organizations are migrating data for ERP apps to the cloud
According to a Cloud Security Alliance survey, 69 percent of organizations are migrating data for popular ERP applications to the cloud, moving to major cloud …

Four cybersecurity trends every CIO should know
The cybersecurity landscape in 2019 will likely bolster bigger, more complex threats and developments. Given the intricacy of today’s cyber security challenges, organisations …

There’s a sizable gap between confidence in security programs and their effectiveness
A Syncsort survey of over 300 respondents found that while 85 percent of respondents are either very or somewhat confident in their organization’s security program, 41 percent …

Evaluating €1bn in cybersecurity research funding
Crossword Cybersecurity looked at nearly 1,200 current and past research projects from academic institutions in the United Kingdom, United States, Europe, Australia, and …

Understanding how data becomes intelligence is central for any successful security program
Threat intelligence is one of the hottest terms in information security at the moment. But, as with so many buzzwords, it is often overused and misused. All the buzz has …

GDPR: Five tips for organizations to remain compliant
For the majority of UK businesses, a huge amount of time and resource was invested to become GDPR compliant in time for the May 2018 deadline. The cost of implementing GDPR …

Email security predictions: What we can expect in 2019
2018 shed a lot of light on how expensive successful phishing attacks can be, with the FBI reporting in July well over $12B in financial losses due to business email …

Small manufacturers play important role in supply chain security
Though the manufacturing sector does not attract the sheer volume of total cyberattacks as other areas of the economy, research has shown that coordinated cyber espionage …

Deception for proactive defense
This article is fourth in a five-part series being developed by Dr. Edward Amoroso in conjunction with the deception technology team from Attivo Networks. The article provides …
Featured news
Resources
Don't miss
- GitHub project maintainers targeted with fake security alert
- Pay, fight, or stall? The dilemma of ransomware negotiations
- Review: Cybersecurity Tabletop Exercises
- IntelMQ: Open-source tool for collecting and processing security feeds
- Quantifying cyber risk strategies to resonate with CFOs and boards