Please turn on your JavaScript for this page to function normally.
gap
Reacting to a big breach

As I write this, the industry is still wagging its fingers at the latest big breach. But in the time that it takes to get this published, there could easily be another …

botnet
PyCryptoMiner ropes Linux machines into Monero-mining botnet

A Linux-based botnet that has been flying under the radar has earned its master at least 158 Monero (currently valued around $63,000). The malware The botnet is based on a …

network
To protect your network, you must first know your network

A sobering statistic regarding commonly used security controls was highlighted in a recent report. “Software and hardware inventory and valuation” was the least …

organize
Infosec expert viewpoint: DevOps security

A Ponemon Institute survey of nearly 1,250 global public sector IT decision makers and managers revealed that public sector organizations undergoing digital transformation are …

businessman
The evolving nature of the CISO role

As IT security increasingly becomes a priority, CISOs’ influence within companies is growing. However, security strategy in many organizations is still largely reactive and …

Don't miss

Cybersecurity news