Please turn on your JavaScript for this page to function normally.
study
Working through the cybersecurity skills gap

It’s no secret that there’s a shortage of qualified personnel in the field of cybersecurity. It’s a problem that has long been noticed and one that is projected to get even …

lock
Securing microservices and containers: A DevOps how-to guide

There is a simple reason for developers adopting the cloud and cloud-native application architectures. These “tools and methods” allow developers to accelerate innovation and …

USA
Shape up US businesses: GDPR will be coming stateside

Despite the significant financial penalties, US consumers have tended to look away or forgive brands in the aftermath of a breach, but recent research shows that this is no …

architecture
Five keys to secure DevOps, cloud and IoT adoption

90 percent of enterprises are engaged with at least one next-generation technology (NGT), such as cloud, IoT, or AI, according to BeyondTrust. Yet, while enterprises are …

key
Why creativity is key to security

Similar to corporate auditors and risk and compliance managers, security teams are often viewed as a hindrance to business growth. They are deemed the killjoys of business …

handshake
How security leaders can be empowered to drive results

The overwhelming demands on security leaders today can have a paralyzing effect. Gartner analysts provided guidance to security and risk leaders and practitioners on how to be …

lock
Cybersecurity: A core component of digital transformation

In this podcast, Kai Grunwitz, Senior VP EMEA at NTT Security, talks about the NTT Security 2018 Risk:Value Report, and the importance of cybersecurity for a successful …

airport security
Airports develop digital transformation roadmaps with biometrics and blockchain

Increased passenger traffic and global capacity constraints will drive airport IT spending to $4.63 billion by 2023, according to Frost & Sullivan. Airports are …

Tyrion
What CISOs can learn from Tyrion on Game of Thrones

Game of Thrones is a gripping, global phenomenon. One of the main reasons for its popularity is its nuanced portrayal of characters who are not 100% good or evil. Over seven …

burn
Security spring cleaning: Tidying up messy firewall rules to reduce complexity

Most security teams are waging a daily battle against complex IT infrastructures, advanced malware and a severe skills shortage – a trifecta that has forced them to tackle …

GDPR
It’s time to embrace GDPR

The noise around the General Data Protection Regulation (GDPR) has been unavoidable, and for good reason. GDPR is coming into effect in a few short days (May 25 to be exact). …

data
Verifying data processing for privacy and GDPR

GDPR has been a topic of conversation in the security risk and management world since the regulatory action was proposed in 2012. Recent events have led to a greater interest …

Don't miss

Cybersecurity news