Please turn on your JavaScript for this page to function normally.
Risk assessment benefits, best practices and pitfalls

Ryan Ward is CISO at Avatier. In this interview, he talks about the overlooked benefits of risk assessment, offers best practices for performing successful risk assessments, …

How to become an ISO 27001 / ISO 22301 consultant

If you are thinking about a career change, becoming an independent consultant for ISO 27001 and/or ISO 22301 certainly sounds like an attractive option. But what do you need …

The evolution of threat detection and Big Data

Mark Gazit is the CEO of ThetaRay, a specialist in threat detection. In this interview he talks about leveraging Big Data to secure networks, the advantages of using …

Enabling secure file sharing in the enterprise

As enterprise mobility meets collaboration, the workplace as we know it is transforming. Gone are the days when employees stopped working after leaving the office or …

Best practices for government agencies to secure IT infrastructure

Many government agencies, departments, subcontractors, service providers, and organizations that operate IT systems on behalf of the government must ensure protection of their …

Shaping mobile security

Most of us are familiar with the “triangle’ project management model, which highlights the constraints on delivering results in projects. The three corners of the …

Infosec industry: Time to put up or shut up

The information security industry is one of the most exciting industries to be involved in. It offers many opportunities to exercise one’s passion and curiosity about …

Tips for a safe holiday season

Cyber scrooges leverage all types of digital devices, social media platforms and mobile apps to take advantage of consumers’ distraction during this festive and busy …

How cybercriminals scam consumers during the holiday season

McAfee announced its annual “12 Scams of the Holidays” list, which includes the most popular ways cybercriminals scam consumers during the holiday season as they …

8 criteria to decide which ISO 27001 policies and procedures to write

If you’re just starting to implement ISO 27001 in your company, you’re probably in a dilemma as to how many documents you need to have, and whether to write …

A holistic approach to protecting intellectual property

Protecting intellectual property (IP) is high priority for security professionals, but IP can be a vague term. What exactly is included under the umbrella of IP? And …

Overcoming Big Data security obstacles

When it comes to security, Big Data can be the cause of many obstacles. As Big Data often contains enormous quantities of personally identifiable information, privacy becomes …

Don't miss

Cybersecurity news