cybersecurity
Three barriers to digital IDs on the blockchain
There has been a lot of hype around blockchain technology and the benefits it could potentially bring to a wide variety of verticals, including identity verification. While …
The human point: Gaining visibility into the context behind user actions
In this podcast recorded at Black Hat USA 2017, Dr. Richard Ford, Chief Scientist at Forcepoint, talks about the security industry’s need of a paradigm shift toward …
DevOps skills gap: Do you have the necessary skills to succeed?
New research shows that software developers are not receiving the training they need to be successful as DevOps becomes the prevalent approach to building and operating …
Medical devices and the Internet of Things: Defending against cyber threats
More than one-third (35.6 percent) of surveyed professionals in the Internet of Things-connected medical device ecosystem say their organizations have experienced a …
Enterprise security culture: Why you need it, and how to create it
Security awareness is a term that most information security professionals are familiar with – security culture a little less so. “Security awareness training is …
STIX and TAXII: Sharing cyber threat intelligence
In this podcast recorded at Black Hat USA 2017, Allan Thomson, CTO at LookingGlass Cyber Solutions, talks about STIX and TAXII. STIX (Structured Threat Information Expression) …
Who is better prepared for IoT-related attacks, SMEs or large organizations?
Small and midsized organizations (SMEs) are taking more steps to protect themselves from security risks associated with the Internet of Things (IoT) than large businesses, …
Understanding your responsibility and security in the cloud
In this podcast recorded at Black Hat USA 2017, Chris Drake, CEO at Armor, talks about the difference between security of the cloud and security in the cloud. Here’s a …
We can’t rely on black swans: Three areas to improve cyber policy now
What will it take for cybersecurity policy to finally catch up to the digital age? I get this question often, and increasingly I worry that it will take a true “black swan” …
Attacks on manufacturing industry continue to rise
The frequency and sophistication of cyber attacks continues to rise globally according to research data in the Q2 Threat Intelligence Report released by NTT Security. Four …
UK essential service operators with poor cyber security face massive fines
Organisations who fail to implement effective cyber security measures could be fined as much as £17 million or 4 per cent of global turnover, as part of plans to make …
Where does corporate cloud security responsibility begin and service provider responsibility end?
Security has, is and will continue to be the cornerstone of advancement in the digital age. Conditions of trust, real or expected, are essential for digital economies to grow …