Please turn on your JavaScript for this page to function normally.
Windows
Is Windows ShimCache a threat hunting goldmine?

Enterprise-wide threat hunting sounds like a daunting task and for inexperienced forensic analysts it certainly can be. However, there are various techniques that can be used …

DevSecOps
Rules automation puts the “Sec” in DevSecOps

Imagine if safety were an afterthought in automobiles: Manufacturers would create a pristine new car and then hand it off to the safety team…which would bolt airbags onto the …

mobile work
Four tips for keeping security worries away this summer

As the summer weather heats up, so does the desire to cut out of the office early and finish the workday from the park, a local pub patio or maybe the family cottage. Now is …

GDPR
Check your printers for leftover GDPR-regulated PII

Many companies are embracing the GDPR as an opportunity to improve privacy, security, and data management, by cutting down on the amount of personal data they keep, ditching …

find
Top six security and risk management trends

Business leaders are becoming increasingly conscious of the impact cybersecurity can have on business outcomes. Gartner said that security leaders should harness this …

code
Four common API vulnerabilities and how to prevent them

Proper security measures are one of the most important aspects of building an application programming interface, or API. It’s great for an API to connect systems and give …

climb
The modern CSO: Future-proofing your organization in a disruptive world

“There are three essential skill sets a modern day CSO must have. The first is knowledge of the business to better align a security strategy to company objectives …

chess
Confidence wavers in face of evolving cybersecurity threats

Webroot found that businesses in the U.S., U.K. and Australia are taking cybersecurity seriously – with almost 100 percent of respondents conducting some form of employee …

architecture
Managing and maintaining security in the enterprise

In the digital age, more often than not, organizations are playing defense against cybercrime. In fact, a report from Online Trust Alliance shows businesses reported 159,700 …

sharing
Digital transformation: Visibility compliance in a transitional world

In this podcast, Darron Gibbard, Chief Technical Security Officer EMEA at Qualys, discusses digital transformation challenges, and illustrates what an organization has to do …

Ocean's Eleven
Has your security evolved to counter Ocean’s Eleven of threat scenarios?

In assessing how the cyber threat and mitigation landscape has evolved over time, I often think of the ways that “cops and robbers” movies have changed: In the old days, a …

building blocks
Will blockchain power the next generation of data security?

Cryptomania is dominating conversations from Silicon Valley to Wall Street. But ‘cryptocurrency’ is only one implementation of the underlying technology innovation that has …

Don't miss

Cybersecurity news