Please turn on your JavaScript for this page to function normally.
idea
Don’t let cybercrime hold your innovation to ransom

When things break, our natural instinct is to look for someone to blame. Why? Because nothing happens by accident. It’s either done on purpose, a casualty of neglect or lack …

idea
Five crucial ways to help keep a system safe from harm

We’re living in an incredible age of technology, invention and innovation. It’s hard to imagine that just a short time ago we couldn’t order groceries for delivery from …

locks
TLS security: Past, present and future

The Transport Layer Security (TLS) protocol as it stands today has evolved from the Secure Sockets Layer (SSL) protocol from Netscape Communications and the Private …

hospital
The path to protecting health data: 10 steps to get started

The information in your medical records can be more valuable than your credit card numbers to a cybercriminal. Experts estimate healthcare data is 50 times more valuable to …

EU
Moving towards compliance: GDPR issues and challenges

In this podcast, Mike McCandless, VP of Sales and Marketing for Apricorn, and Jon Fielding, Managing Director for Apricorn EMEA, discuss the European Union General Data …

idea
5 incident response practices that keep enterprises from adapting to new threats

Security analysts within enterprises are living a nightmare that never ends. 24 hours a day, their organizations are being attacked by outside (and sometimes inside) …

locks
Breaking TLS: Good or bad for security?

As the use of TLS by malware and phishing increases, some security practitioners are seeking solutions to break TLS so they can monitor all traffic in and out of their …

IoT
Ready, set, race to the IoT hub

Battle lines are being drawn. Armies are being marshaled. Territory is being eyed and strategies drawn up with military precision. But this war is about to be fought in your …

USA flag
Industry reactions to Trump’s executive order on cybersecurity

On Thursday, President Donald Trump signed a long-awaited executive order on cybersecurity. Mainly, the order requires a number of cybersecurity reviews across the various …

defend
Three cybersecurity threat trends that organizations should address today

The cybersecurity landscape grows seemingly more complex – and dangerous – by the day: Hackers and other bad actors unleash increasingly intricate and formidable attacks, on …

World Password Day
World Password Day: Make the Internet a more secure place

Identity theft is one of the world’s fastest growing crimes, but adding strong authentication to your password can prevent it. Today is World Password Day, and here are some …

crowd
Making security everybody’s business goes beyond strong passwords

One of my colleagues recently shared a story that unfortunately, is not an uncommon happening among line of business application owners. He was monitoring a high value …

Don't miss

Cybersecurity news