strategy

Tips on how to address the growing cyber security skills gap
Sophisticated cyber security defenses are increasingly in high demand as a cyber security attack is now viewed as an inevitability. However, a majority of surveyed …

Security skills gap? What security skills gap?
After the year we’ve had, it shouldn’t come as a surprise that cybersecurity skills are heavily in demand. Breaches, attacks and incidents have never been far from the …

Five ways to prevent data leaks
The story still strikes fear into the hearts of IT departments: As many as 70 million credit- and debit card accounts were compromised in less than a month during the Target …

Six critical customer support differentiators in cybersecurity
Regardless of size or sector, excellent customer support is a major differentiator within any organization. In the cybersecurity industry, however, tech support is more than a …

Why you need a tailored application security program
For companies that provide applications to their customers, keeping those applications secure is a must. Setting up an application security program is the next logical step, …

It’s time to rethink using remote access VPNs for third-party access
No longer safely operating behind the traditional corporate perimeter, business productivity today depends on integrating external members of the extended enterprise into the …

Number of disclosed vulnerabilities reaches all time high in 2016
A new report shows 2016 broke the previous all-time record for the highest number of reported vulnerabilities. The 15,000 vulnerabilities cataloged during 2016 by Risk Based …

CSOs reveal true cost of breaches
Over one-third of organizations that experienced a breach in 2016 reported substantial customer, opportunity and revenue loss of more than 20 percent, according to the Cisco …

Why companies shouldn’t feel helpless in the fight against ransomware
According to recent reports, ransomware is now a billion dollar business for cybercriminals. Attackers are honing in on the weak spots of organisations; human behaviour …

Six best practices for managing cyber alerts
Security professionals know that the number of cyber alerts is growing at a frantic pace. Even a mid-sized company can face tens of thousands of alerts every month. As the …

Irregular application testing: App security in healthcare
Nearly half (45%) of NHS trusts scan for application vulnerabilities just once a year, with less only 8% doing so on a daily basis, according to Veracode. This potentially …

Machine learning in cybersecurity will boost big data, intelligence, and analytics spending
Cyber threats are an ever-present danger to global economies and are projected to surpass the trillion dollar mark in damages within the next year. As a result, the …
Featured news
Resources
Don't miss
- Attackers are leveraging Cisco Smart Licensing Utility static admin credentials (CVE-2024-20439)
- Phishers are increasingly impersonating electronic toll collection companies
- 7 ways to get C-suite buy-in on that new cybersecurity tool
- Building a cybersecurity strategy that survives disruption
- Open-source malware doubles, data exfiltration attacks dominate