Five key considerations when developing a Security Operations Center
Ensuring access to a reliable feed of threat intelligence through a security operations center (SOC) is an essential element of many organization’s security strategy today. …
Bring visibility to shadow APIs and ensure that security standards are being met
Last week Data Theorem introduced the industry’s first automated API discovery and security inspection solution aimed at addressing API security threats introduced by today’s …
Consumer skepticism and stronger protections call for security changes
2018 became the year where protecting personal information established itself as a right that is wanted by and entitled to citizens. More people started questioning who owns …
Break out of malware myopia by focusing on the fundamentals
Organizations today suffer from malware myopia, a condition characterized by threat-centric security programs caused by the ease of imagining a takedown by malicious code. …
Data privacy automation: Unlock your most valuable asset
In years past, data privacy was the purview of the chief privacy officer. However, increasingly, CTOs are being tasked with operationalizing a data privacy solution for the …
Hackers wage a new Cold War
The Cold War of the mid-twentieth century played out as a truly epic conflict. The U.S. and the Soviet Union mobilized spies across the globe, supported proxy armies from the …
A case for more accessible cybersecurity
If you’re a part of the infosec community, you’re likely all too familiar with the frantic calls, text messages and emails we receive from our friends and family …
What can we do to reverse the cybersecurity skills shortage?
An ever widening cybersecurity skills gap is making comprehensive cyber security protection – based on a combination of the latest tools and internal expertise – …
Let user experience guide your security requirements
If you’re like most business leaders, you try to do everything you can to keep your company’s information safe. You tell your employees to use strong passwords and offer …
Security’s bane: The false positive
Nothing makes security look worse than the false negative – when we miss an attack and damage is suffered. As security professionals, it’s something we all obsess a lot …
The security issues 3D printing should solve before going mainstream
It’s always fun when you can mix your personal hobbies and interests with your profession, and often the passion you carry for the things you love can lead to valuable and …
Intensifying DDoS attacks: Choosing your defensive strategy
One of the biggest misconception regarding DDoS attacks is that they are a once-in-a-lifetime event for organizations, says Josh Shaul, VP of Web Security at Akamai. …
Featured news
Resources
Don't miss
- North Korean IT workers are extorting employers, FBI warns
- GUI frontends for GnuPG, the free implementation of the OpenPGP standard
- Juniper enterprise routers backdoored via “magic packet” malware
- Cisco fixes ClamAV vulnerability with available PoC and critical Meeting Management flaw
- SonicWall SMA appliances exploited in zero-day attacks (CVE-2025-23006)