Please turn on your JavaScript for this page to function normally.
Ideas
Four IT trends CIOs need to know about

CIOs looking for a benchmark to gauge IT success can depend on user experience metrics to provide the answer. In each of today’s “third platform” …

Ryan Stolte, Bay Dynamics
Security analytics: Risk from the inside out

High profile security breaches are at an all-time high. The threat has finally reached the boardroom, and we’re seeing increased security spending. Funds are increasingly …

danger
The growing threat of ransomware: Lucrative, low-risk and easy to use

Recent headlines are testament to the growing popularity of ransomware attacks on businesses and consumers alike. In January, for example, Lincolnshire County Council saw its …

ADAC test
Industry collaborates on automotive cybersecurity best practices

New technology has paved the way for extraordinary advancements in vehicle safety, emissions reduction, and fuel economy. Today’s vehicles do more to keep drivers secure …

entrepreneur
Challenges of cybersecurity due diligence in the acquisition process

Acquirers are increasingly aware of the need for vigorous cybersecurity due diligence in M&A, yet often lack the proper personnel to conduct thorough analyses, according …

Eduardo Cabrera, Chief Cybersecurity Officer at Trend Micro
CISOs need teamwork and a framework, says Chief Cybersecurity Officer at Trend Micro

Eduardo Cabrera is the Chief Cybersecurity Officer at Trend Micro, responsible for analyzing emerging cyber threats to develop enterprise risk management strategies. Before …

business
Five trends to help senior executives protect against fraud threats

A new Experian report identifies five trends that businesses should assess and take action on to mitigate fraud and improve the customer experience in today’s …

earth
Cyber resilience: Securing global infrastructures

It seems like every part of the human experience is touched by technology in some way. In many respects, it makes our lives safer, our communication easier, and creates …

Businessman
Security in the M&A process: Have you done your technical due diligence?

Company acquisitions are common in the cyber security market. Whether you are attempting to bolster your strategic position or looking to acquire the best talent, chances are …

Rio 2016 tickets
Rio 2016: The world is watching, especially hackers

When each nation’s best athletes compete at the Olympic Games, one city seemingly becomes the center of the universe. And while we look on closely—captivated by the …

Laptop
The damaging divide in application security

It’s time to get serious about application security and the divisive reality of breaches. Even with today’s intense focus on security, web application attacks are on the rise: …

collaboration
Keys to successful security vendor collaboration

The IT manager tasked with understanding today’s complex vendor landscape is in an unenviable position. The rapid proliferation of new types of cyber security threats and …

Don't miss

Cybersecurity news