Please turn on your JavaScript for this page to function normally.
Connect
DHS releases guidelines for CISA-sanctioned cybersecurity information sharing

The US Department of Homeland Security has published guidelines on how the private sector and federal entities can share cyber threat indicators (CTIs) with the US federal …

money
What’s the real cost of a security breach?

The majority of business decision makers admit that their organisation will suffer an information security breach and that the cost of recovery could start from around $1 …

bald eagle
Is the Cybersecurity Act of 2015 effective?

While many are decrying the newly signed Cybersecurity Act of 2015 for its privacy issues, DB Networks is taking the Act to task for an equally troublesome reason: It is based …

binary
Five key cybersecurity trends for 2016

The overwhelming shift to mobile and cloud computing among both businesses and consumers will see some surprising additions to the risk landscape in 2016. ISACA shares five …

Abstract
Vision for a new generation of experimental cybersecurity research

How do cybersecurity experts discover how to properly defend a system or build a network that’s secure? As in other domains of science, this process involves hypothesis, …

Do CEOs know enough about cyber security?

One-third of CEOs and 43 percent of management teams are not regularly briefed on cyber security issues, according to Dimensional Research. Additionally, while 79 percent of …

Don't miss

Cybersecurity news