cybersecurity
Most businesses will not put off cloud adoption because of security concerns
Businesses are pressing ahead with their digital transformation plans, despite fears of being hit by a cyber attack or data protection regulations. This is according to a new …
Businesses finally realize that cyber defenses must evolve
Cybersecurity is finally getting the attention it deserves – it is only regrettable that this good news is the result of bad news: more numerous, complex, and damaging …
Trusted identities bridge gap between connected workers and smart buildings
Trusted identities can serve as the backbone for smart buildings and today’s connected workforce, according to a new study conducted by IFSEC Global. The study focused on how …
Fostering a safe place for businesses to work in
It’s no secret that in the past few years, business leaders have begun to realise the potential of digital transformation to give their organisation a competitive edge. …
Average data breach cost declines 10% globally
The average cost of a data breach is $3.62 million globally, a 10 percent decline from 2016 results. This is the first time since the global study was created that there has …
Evaluating artificial intelligence and machine learning-based systems for cyber security
All indicators suggest that 2017 is shaping up to be the year of artificial intelligence and machine learning technology for cyber security. As with most trends in our …
Regional regulatory compliance trends: Strategies and implications
In this podcast, Tim White, Director of Product Management, Policy Compliance at Qualys, talks about regulatory compliance trends that across a variety of different regions in …
Perception and reality: The role of AI and automated cyber defenses
Executives in the U.S. and Europe now place broad trust in artificial intelligence (AI) and machine learning systems, designed to protect organizations from more dynamic …
Most corporate finance leaders expect to change fraud-fighting strategies
Today’s senior finance executives are battling record levels of fraud, in turn narrowing corporate focus and limiting resources that could otherwise be devoted to …
DevSecOps: Build a bridge between fast and secure software development
Despite the pervasive belief that security and development teams have conflicting priorities, initiatives such as creating DevOps environments and focusing on product …
Poor endpoint security can cost you millions in detection, response, and wasted time
A new study reveals organizations are wasting an average of $6 million on the time to detect and contain insecure endpoints, among other staggering findings that show endpoint …
Where does the cyber security buck stop?
Late last year, Bruce Schneier testified before the U.S. House Energy and Commerce committee asking them to consider imposing security regulations on the Internet of Things …
Featured news
Sponsored
Don't miss
- Black Friday shoppers targeted with thousands of fraudulent online stores
- RomCom hackers chained Firefox and Windows zero-days to deliver backdoor
- How to recognize employment fraud before it becomes a security issue
- Practical strategies to build an inclusive culture in cybersecurity
- Domain security posture of Forbes Global 2000 companies