Please turn on your JavaScript for this page to function normally.
traffic
Security spring cleaning: 5 tips for tidying up network safeguards

Networks need regular cleaning just like your home, car or garage. Why? The answer is simple – poor security hygiene can lead to major data breaches. If you don’t …

chess
What CISOs should focus on when deciding on a strategy

The effectiveness of an organization’s security strategy and implementation can sometimes be difficult to assess. Michael Hamilton, President and CISO of CI Security, …

bulb
Tips to spring clean your company’s social media and stay protected

With springtime comes warmer weather, sunnier days, and—somewhat inexplicably—the urge to purge. And while many will budget extra time to clear out closets or downsize their …

bomb
A deeper look: How the 281 data breaches in Q1 2019 will impact companies

High-profile data breaches show no sign of slowing down. In the first quarter of 2019, there were 281 reported data breaches, exposing more than 4.53 billion records. …

EU
Three ways GDPR benefits US companies

It’s hard to believe we’ve almost reached the one-year anniversary of the date the General Data Protection Regulation (GDPR) went into effect. Leading up to that May 25, 2018 …

satellite
Securing satellites: The new space race

A decade ago, it would have cost you a billion dollars to deploy a satellite into space. Fast forward ten years and you can now have your own personal satellite floating in …

library
Whose (usage) data is it, anyway?

Around the world, business customers now demand business-to-business (B2B) SaaS companies safeguard their usage data. More importantly, they want to know how SaaS companies …

cloud
Executing a multi-cloud strategy: Crawl, walk, run

Despite many challenges, enterprises are increasingly adopting cloud computing in an effort to become more agile, lower IT costs, and have the ability to scale. Most of those …

healthcare
Is curiosity killing patient privacy?

The digitization of healthcare is changing the face of fraud. With the growth of electronic health records (EHRs), online patient portals and virtual clinics, a wealth of …

building
Supply chain attacks: Mitigation and protection

In software development, a supply chain attack is typically performed by inserting malicious code into a code dependency or third-party service integration. Unlike typical …

alert
Making the most of threat intelligence with threat intelligence gateways

Even though many security professionals are still dissatisfied with threat intelligence accuracy and quality, its use as a resource for network defense is growing. According …

firefighters
SEC demands better disclosure for cybersecurity incidents and threats

As companies increasingly rely on networked systems and on the Internet, cybersecurity threats have grown. Companies that fall victim to a successful cyberattack incur …

Don't miss

Cybersecurity news