cybersecurity
How people-based actions put critical data at risk
While 80 percent of respondents believe it’s important to understand the behaviors of people as they interact with intellectual property and other critical business …
Is healthcare industry’s security spending focused on the wrong technologies?
Global healthcare IT professionals are confronting a rapidly changing, challenging landscape, with 66% experiencing a data breach and 88% feeling vulnerable as a result. In …
How to leverage intelligent deception to detect cyber attacks
Perimeters are fading, and attackers find it easier and easier to penetrate organizational networks. Organizational networks today are chaotic, they’re very dynamic, and this …
Intel Security’s strategy for eliminating cybersecurity fragmentation
At RSA Conference 2017, Intel Security outlined a new, unifying approach for the cybersecurity industry that strives to eliminate fragmentation. The workforce shortage facing …
U.S. consumers’ views on cybersecurity
To better understand how Americans think about hacker motivations, consumer versus business security responsibilities, ransomware and the political climates impact on the …
Cybersecurity training management and skills assessment platform
No cost and open source cybersecurity massive open online course (MOOC) provider Cybrary announced the launch of its Teams training management and skills assessment platform …
Tips on how to address the growing cyber security skills gap
Sophisticated cyber security defenses are increasingly in high demand as a cyber security attack is now viewed as an inevitability. However, a majority of surveyed …
IBM Watson to power cognitive security operations centers
At RSA Conference 2017, IBM Security announced Watson for Cyber Security, the industry’s first augmented intelligence technology designed to power cognitive security …
Security skills gap? What security skills gap?
After the year we’ve had, it shouldn’t come as a surprise that cybersecurity skills are heavily in demand. Breaches, attacks and incidents have never been far from the …
Five ways to prevent data leaks
The story still strikes fear into the hearts of IT departments: As many as 70 million credit- and debit card accounts were compromised in less than a month during the Target …
CERT updates insider threat guidebook
The CERT Division of the Software Engineering Institute (SEI) at Carnegie Mellon University released the fifth edition of the Common Sense Guide to Mitigating Insider Threats. …
Security practices need to evolve in order to handle complex threats
There is no one-size-fits-all security solution to address the threat landscape today’s businesses face. Each organization has unique security obstacles and obligations. …
Featured news
Resources
Don't miss
- Cybercrime forums Cracked and Nulled seized, operators arrested
- SimpleHelp RMM vulnerabilities may have been exploited to breach healthcare orgs
- Zscaler CISO on balancing security and user convenience in hybrid work environments
- ExtensionHound: Open-source tool for Chrome extension DNS forensics
- How to use Hide My Email to protect your inbox from spam