Please turn on your JavaScript for this page to function normally.
smart hospitals, healthcare
How to securely deploy medical devices within a healthcare facility

The risks insecure medical devices pose to patient safety are no longer just theoretical, and compromised electronic health records may haunt patients forever. A surgical …

Business ideas
How to harmonize IT GRC controls in your environment

In this podcast recorded at RSA Conference 2017, Tim White, Director of Product Management, Policy Compliance at Qualys, talks about about achieving uniform compliance in risk …

connection
DevSecOps: Building continuous security into IT and app infrastructures

In this podcast recorded at RSA Conference 2017, Chris Carlson, VP of Product Management, Cloud Agent Platform at Qualys, talks about DevSecOps. Instead of making security a …

hand
How to minimize the risk and impact of identity fraud

The number of identity fraud victims increased by sixteen percent (rising to 15.4 million U.S. consumers) in the last year, according to Javelin Strategy & Research. They …

credit cards secure
PCI SSC publishes best practices for securing e-commerce

Exponential online sales growth paired with the EMV chip migration in the US makes e-commerce payment security for merchants more important than ever before. As EMV chip …

gap
Real-time network health management: Closing the gap between known and unknown threats

2016 was yet another record year for cyber security threats. As of July 2016, there were 522 reported breaches, exposing more than 13 million records, according to the …

Redefining the role of security in software development

Software is becoming increasingly important for market success, driving an ever greater need for speed in the development process. The rapid adoption of DevOps is testimony to …

smile
Data Privacy Day reminds digital citizens to better manage their privacy

Many consumers do not fully understand how their information is collected, used and stored by the devices, apps and websites they use every day. According to a recent Pew …

door
Addressing the challenges of vulnerability coordination

The FIRST Vulnerability Coordination Special Interest Group (SIG) made available for public comment through January 31, 2017 the draft Guidelines and Practices for Multi-party …

CISSP
CISSP Planning Kit: Your guide to CISSP certification and beyond

Studying for the CISSP exam can seem overwhelming, which is why ISC2 developed this quick guide. Download this planning kit for a CISSP overview, study tips, preview of how to …

IoT
IoT Trust Framework: The foundation for future IoT certification programs

The Online Trust Alliance (OTA) released its updated IoT Trust Framework. Serving as a product development and risk assessment guide for developers, purchasers and retailers …

Wi-Fi
Wi-Fi risks: Delivering a secure hotspot

The fact that Wi-Fi stands for Wireless Fidelity hints at how long Wi-Fi has been around, but it was only in 1999 that the Wi-Fi Alliance formed as a trade association to hold …

Don't miss

Cybersecurity news