Please turn on your JavaScript for this page to function normally.
risk
Mitigating internal risk: Three steps to educate employees

IT security is usually focused on how to prevent outsiders with malicious intent from causing harm to your IT systems and data. While this is a valid concern, people within …

earth
Playing the blame game: Breaking down cybersecurity attribution

Attributing the adversary behind a cyber attack ranks as perhaps the hardest challenge in all of cyber security, well beyond securing networks from intrusions, for the simple …

gears
Approaching security self-sufficiency

As part of my role as CSO, I’m extremely lucky to get to have conversations with CISOs, CTOs, and other technology leaders across industries. One of the things that has always …

industry
End the air gapping myth in critical infrastructure security

In an environment where we’re seeing increasing demand for connectivity between operational technology (OT) and IT, security teams have to dispel the air gapping myth to …

building
The new CISO imperative: Solving the information management paradox

In the drive to become more cyber resilient in 2017, organizations are extending risk management that is traditionally based on parametric measures (i.e., data loss prevention …

shop online
How to create a safer shopping experience

The annual holiday season has arrived. The air grows crisp (at least in the Northern hemisphere), new, cool gadgets are released and cyberattacks, along with cologne ads, …

flames
12 tips for implementing secure business practices

Optiv Security shared a list of a dozen tips for implementing secure business practices during the 2016 holiday season. Security experts developed these recommendations to …

money
CISOs must assess risks and identify the real security budget

Organizations spend an average of 5.6 percent of the overall IT budget on IT security and risk management, according to Gartner. However, IT security spending ranges from …

Facebook
Six tips for practicing safe social media

With Facebook now counting over 1.7 billion monthly users and LinkedIn another 467 million, it was only a matter of time until criminal hackers turned their attention to …

Industry
Cybersecurity advice for the nuclear industry

Less complexity, an active defense, transformative research, and institutionalized cybersecurity should be nuclear industry’s key priorities to stem the rising tide of …

kaspersky Lab KIPS
Cybersecurity gamification: A shortcut to learning

Cybersecurity awareness trainings are usually a boring affair, so imagine my colleagues’ surprise when I exited the room in which I participated in a demonstration of …

IoT
The early IoT gets the worm

Five days after the start of World War I, Sir Edward Grey, British Foreign Secretary, remarked to a close friend, “The lights are going out all over Europe, we shall not see …

Don't miss

Cybersecurity news