Please turn on your JavaScript for this page to function normally.
London
UK businesses overlook external providers when developing cyber strategies

Large businesses in the UK could be falling short when it comes to assessing the cyber resilience of external providers within their supply chain network, according to new …

handshake
How security leaders can be empowered to drive results

The overwhelming demands on security leaders today can have a paralyzing effect. Gartner analysts provided guidance to security and risk leaders and practitioners on how to be …

lock
Cybersecurity: A core component of digital transformation

In this podcast, Kai Grunwitz, Senior VP EMEA at NTT Security, talks about the NTT Security 2018 Risk:Value Report, and the importance of cybersecurity for a successful …

DevSecOps
DevSecOps is maturing, 62% of organizations have a team in place

During RSA Conference 2018, Aqua Security surveyed 80 security professionals to gain their unfiltered, high-level perspective on the fast-emerging discipline of DevSecOps. …

Tyrion
What CISOs can learn from Tyrion on Game of Thrones

Game of Thrones is a gripping, global phenomenon. One of the main reasons for its popularity is its nuanced portrayal of characters who are not 100% good or evil. Over seven …

risk
Quantifying cyber exposure: Attackers are racing ahead

Cybercriminals have a median seven-day window of opportunity during which they can exploit a vulnerability to attack their victims, potentially siphoning sensitive data, …

burn
Security spring cleaning: Tidying up messy firewall rules to reduce complexity

Most security teams are waging a daily battle against complex IT infrastructures, advanced malware and a severe skills shortage – a trifecta that has forced them to tackle …

password
Password pattern analysis: Risky, lazy passwords the norm

Dashlane announced the findings of an analysis of over 61 million passwords. The analysis was conducted with research provided by Dr. Gang Wang, an Assistant Professor in the …

danger
Pressures impacting security pros are up, threats are turning up the heat

Trustwave released the 2018 Security Pressures Report based on a global survey of 1,600 full-time IT professionals who are security decision makers or security influencers …

GDPR
It’s time to embrace GDPR

The noise around the General Data Protection Regulation (GDPR) has been unavoidable, and for good reason. GDPR is coming into effect in a few short days (May 25 to be exact). …

analyst
The ethical and legal dilemmas of threat researchers

Threat intelligence is mainstreaming into a de-facto everyday tool of cyber-defense. But all that intelligence must be collected, analyzed, and prepared by someone. Enter …

tunnel
Most businesses believe stronger data protection policies will lead to fewer breaches

In light of new data privacy legislations, a new Webroot report looks at how businesses in the U.S., U.K., and Australia are adjusting to new data security measures in order …

Don't miss

Cybersecurity news