Please turn on your JavaScript for this page to function normally.
burn
Security spring cleaning: Tidying up messy firewall rules to reduce complexity

Most security teams are waging a daily battle against complex IT infrastructures, advanced malware and a severe skills shortage – a trifecta that has forced them to tackle …

GDPR
It’s time to embrace GDPR

The noise around the General Data Protection Regulation (GDPR) has been unavoidable, and for good reason. GDPR is coming into effect in a few short days (May 25 to be exact). …

data
Verifying data processing for privacy and GDPR

GDPR has been a topic of conversation in the security risk and management world since the regulatory action was proposed in 2012. Recent events have led to a greater interest …

red
Fighting ransomware with network segmentation as a path to resiliency

Recent cybersecurity events involving the use of ransomware (WannaCry and similar variants) represent the latest examples highlighting the need for organizations to not only …

analyst
Threat analytics: Keeping companies ahead of emerging application threats

Every application that is downloaded via an app store runs in a zero-trust environment. When a protected app is published to an official app store, an open loop of protection …

analysis
Combating fraud and money laundering with graph analytics

Dirty money and money laundering have been around since the existence of currency itself. On a global level, as much as $2 trillion is washed annually, estimates the United …

automate
Automating web app testing to secure your environment

In this podcast recorded at RSA Conference 2018, Dave Ferguson, Director, Product Management for Web Application Security at Qualys, talks about the challenges and benefits of …

GDPR
GDPR compliance: Identifying an organization’s unique profile

After a two-year transition period, the General Data Protection Regulation (GDPR) becomes enforceable beginning 25 May 2018. Presumably, many large companies have been working …

Capsule8
How to adopt the mindset of continuous security for security operations

In this podcast recorded at RSA Conference 2018, Dino Dai Zovi, co-founder and CTO at Capsule8, talks about what continuous security is, and how you should bring more of this …

handshake
Why collaboration can be a killer app for defense

In this podcast recorded at RSA Conference 2018, Travis Farral, Director of Security Strategy at Anomali, talks about the impact of blue team collaboration. Discover why …

mobile
Risky business: Are mobile employees compromising business info?

Americans logged 457.4 million trips for business in 2016, and there is no sign of business travel slowing down, with global business travel spend expected to rise 5.8 percent …

abstract
Are SMBs driving the adoption of security automation by enterprises?

If you tracked the lifecycle of new security technologies, you’d likely see that most start as enterprise solutions and eventually trickle down to small and medium-sized …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools