Please turn on your JavaScript for this page to function normally.
Laptop
The damaging divide in application security

It’s time to get serious about application security and the divisive reality of breaches. Even with today’s intense focus on security, web application attacks are on the rise: …

collaboration
Keys to successful security vendor collaboration

The IT manager tasked with understanding today’s complex vendor landscape is in an unenviable position. The rapid proliferation of new types of cyber security threats and …

city night
Network monitoring tips for an increasingly unsafe world

Enterprise IT has evolved significantly over the last decade. Today, IT teams are not only responsible for the availability and performance of their network but also the …

Linux Server Security
Review: Linux Server Security

About the author Chris Binnie is a Technical Consultant with 20 years of experience working with Linux systems, and a writer for Linux Magazine and Admin Magazine. He built an …

Businessman
How CISOs can work with the C-suite to define the cybersecurity risk level

Defining the cybersecurity risk level for any organization should be a collaborative effort that balances the need for risk mitigation with fiscal responsibility. Although the …

Review: Secure & Simple: A Small-Business Guide to Implementing ISO 27001 On Your Own

About the author Dejan Kosutic is the author of numerous articles, tutorials, documentation templates, webinars, and courses about information security and business continuity …

Don't miss

Cybersecurity news