Please turn on your JavaScript for this page to function normally.
person
Three barriers to digital IDs on the blockchain

There has been a lot of hype around blockchain technology and the benefits it could potentially bring to a wide variety of verticals, including identity verification. While …

crowd
The human point: Gaining visibility into the context behind user actions

In this podcast recorded at Black Hat USA 2017, Dr. Richard Ford, Chief Scientist at Forcepoint, talks about the security industry’s need of a paradigm shift toward …

icosahedral
DevOps skills gap: Do you have the necessary skills to succeed?

New research shows that software developers are not receiving the training they need to be successful as DevOps becomes the prevalent approach to building and operating …

healthcare
Medical devices and the Internet of Things: Defending against cyber threats

More than one-third (35.6 percent) of surveyed professionals in the Internet of Things-connected medical device ecosystem say their organizations have experienced a …

hands
Enterprise security culture: Why you need it, and how to create it

Security awareness is a term that most information security professionals are familiar with – security culture a little less so. “Security awareness training is …

building
STIX and TAXII: Sharing cyber threat intelligence

In this podcast recorded at Black Hat USA 2017, Allan Thomson, CTO at LookingGlass Cyber Solutions, talks about STIX and TAXII. STIX (Structured Threat Information Expression) …

IoT
Who is better prepared for IoT-related attacks, SMEs or large organizations?

Small and midsized organizations (SMEs) are taking more steps to protect themselves from security risks associated with the Internet of Things (IoT) than large businesses, …

cloud
Understanding your responsibility and security in the cloud

In this podcast recorded at Black Hat USA 2017, Chris Drake, CEO at Armor, talks about the difference between security of the cloud and security in the cloud. Here’s a …

idea
We can’t rely on black swans: Three areas to improve cyber policy now

What will it take for cybersecurity policy to finally catch up to the digital age? I get this question often, and increasingly I worry that it will take a true “black swan” …

data
Attacks on manufacturing industry continue to rise

The frequency and sophistication of cyber attacks continues to rise globally according to research data in the Q2 Threat Intelligence Report released by NTT Security. Four …

pounds
UK essential service operators with poor cyber security face massive fines

Organisations who fail to implement effective cyber security measures could be fined as much as £17 million or 4 per cent of global turnover, as part of plans to make …

cloud
Where does corporate cloud security responsibility begin and service provider responsibility end?

Security has, is and will continue to be the cornerstone of advancement in the digital age. Conditions of trust, real or expected, are essential for digital economies to grow …

Don't miss

Cybersecurity news