Please turn on your JavaScript for this page to function normally.
businessman
The evolving nature of the CISO role

As IT security increasingly becomes a priority, CISOs’ influence within companies is growing. However, security strategy in many organizations is still largely reactive and …

abstract
Digital future: Are we ready for what’s next?

The Internet Society (ISOC), a global non-profit dedicated to ensuring the open development, evolution and use of the Internet, released “Paths to our Digital …

bulb
AI will change the face of security, but is it still the stuff of sci-fi?

The technology industry has always had a big problem with hype, with marketing teams, analysts and the media alike tending to fixate on the next big thing that will …

threat intelligence
Organizations struggle to maximize the value of threat intelligence

Amidst growing concerns of large-scale cyber attacks, 84 percent of organizations participating in a Ponemon Institute survey indicated threat intelligence is “essential …

idea
Using behavior analysis to solve API security problems

When people think about complex security challenges, airport security might be the most familiar. The scope of challenges and implications of breaches are daunting. This is …

organize
KPN CISO paints a greater security picture

Being the CISO of such a huge and diverse company as KPN, the Netherlands’ largest telecom and ISP provider, requires great determination, and the current holder of the …

idea
Do IT modernization efforts increase security challenges?

Most government IT executives believe that IT modernization projects increase security challenges as opposed to alleviate them, according to a new study from Unisys. A large …

metro
Insurers increasingly concerned about silent cyber exposure

Around half of industry practitioners see the risk of silent cyber exposure – potential cyber-related losses due to silent coverage from insurance policies not specifically …

element
Key elements of a secure, sensitive information sharing strategy

It’s been said, data is like the new oil. What does this mean exactly? Like oil, data is a commodity. But unlike oil, the value of data isn’t susceptible to supply and demand. …

user
Skilled security staff are hard to find, security teams need to be creative

A study conducted in July by Dimensional Research examined how organizations are addressing the cybersecurity skills gap. Study respondents included 315 IT security …

GDPR
Navigating GDPR in the mobile enterprise

Securing data and protecting privacy in a connected world is already a major challenge for any enterprise, and mobility only magnifies this challenge. Mobile devices are …

clock
The real cost of alarm fatigue

One of the toughest challenges for an IT security team is managing and sifting through the deluge of security alerts that are created on a daily basis. Teams can waste …

Don't miss

Cybersecurity news