Please turn on your JavaScript for this page to function normally.
EU
GDPR’s impact: The first six months

GDPR is now six months old – it’s time to take an assessment of the regulation’s impact so far. At first blush it would appear very little has changed. There are no …

Blocks
For recent big data software vulnerabilities, botnets and coin mining are just the beginning

The phrase “with great power comes great responsibility” was excellent advice when Ben Parker said it to his nephew Peter, aka Spiderman. It is even more …

risk
Don’t accept risk with a pocket veto

We who live risk management know there are four responses when confronted with a credible risk to our organizations. We can treat the risk to reduce it. We can avoid the risk …

biohazard
Conficker: A 10-year retrospective on a legendary worm

This November marked the 10-year anniversary of Conficker, a fast-spreading worm targeting Microsoft systems that went on to claim one of the highest levels of infection in …

malware
Vaporworms: New breed of self-propagating fileless malware to emerge in 2019

WatchGuard Technologies’ information security predictions for 2019 include the emergence of vaporworms, a new breed of fileless malware with wormlike properties to …

connection
Five key considerations when developing a Security Operations Center

Ensuring access to a reliable feed of threat intelligence through a security operations center (SOC) is an essential element of many organization’s security strategy today. …

idea
Bring visibility to shadow APIs and ensure that security standards are being met

Last week Data Theorem introduced the industry’s first automated API discovery and security inspection solution aimed at addressing API security threats introduced by today’s …

network
Consumer skepticism and stronger protections call for security changes

2018 became the year where protecting personal information established itself as a right that is wanted by and entitled to citizens. More people started questioning who owns …

malware
Break out of malware myopia by focusing on the fundamentals

Organizations today suffer from malware myopia, a condition characterized by threat-centric security programs caused by the ease of imagining a takedown by malicious code. …

lens
Data privacy automation: Unlock your most valuable asset

In years past, data privacy was the purview of the chief privacy officer. However, increasingly, CTOs are being tasked with operationalizing a data privacy solution for the …

keyboard
Hackers wage a new Cold War

The Cold War of the mid-twentieth century played out as a truly epic conflict. The U.S. and the Soviet Union mobilized spies across the globe, supported proxy armies from the …

laptop
A case for more accessible cybersecurity

If you’re a part of the infosec community, you’re likely all too familiar with the frantic calls, text messages and emails we receive from our friends and family …

Don't miss

Cybersecurity news