
A smooth transition to the cloud is possible with identity governance
It comes as no surprise that organizations large and small are considering adopting the cloud as part of their overall IT strategy. The variety of impressive benefits that the …

Why good security foundations are better than the best security mitigation
Since founding VDOO, we have been working to analyze a great many IoT devices, in the broadest way possible. The more we look into these devices and find their …

Expand vulnerability and risk management programs to eliminate security misconfigurations
In this podcast recorded at RSA Conference 2018, Tim White, Director of Product Management, Policy Compliance at Qualys, discusses how expanding vulnerability and risk …

GDPR: It’s an issue of transparency
The General Data Protection Regulation (GDPR) has been on the lips of security professionals for a long time now – but in just over a month, it will become a reality. While it …

Organizations are becoming more resilient to focused cyber attacks
Accenture has polled 4,600 security decision makers at US$1B+ companies in 15 countries to understand the effectiveness of security efforts and the adequacy of existing …

1-in-4 orgs using public cloud has had data stolen
McAfee has polled 1,400 IT professionals across a broad set of countries (and continents), industries, and organization sizes and has concluded that lack of adequate …

How security researchers deal with risks stemming from their activities
Broad and inconsistent interpretations of behind the times laws, new anti-infosec legislation, lawsuits and criminal prosecutions are having a chilling effect on security …

How to minimize healthcare supply chain threats
There are many reasons why healthcare institutions have poor cybersecurity: most resources go towards providing patient care and not enough is left for cybersecurity; not all …

Security teams are under resourced, overwhelmed by attackers
A new report conducted by the Ponemon Institute uncovered security’s “patching paradox” – hiring more people does not equal better security. While security teams plan to hire …

Using biometrics to protect crypto currency
The rise of crypto currency is something that investors have monitored closely. Whether Bitcoin, Zcash or Ripple, the rise of this digital currency is here to stay. With this …

Are legacy technologies a threat to EU’s telecom infrastructure?
Telecommunications is a key infrastructure based on how our society works. It constitutes the main instrument that allows our democracy and our EU core values such as freedom, …

Secure software development practices for developers, organizations and technology users
SAFECode announced today the publication of the Fundamental Practices for Secure Software Development: Essential Elements of a Secure Development Life Cycle Program (Third …
Featured news
Resources
Don't miss
- Balancing data protection and clinical usability in healthcare
- BlueToolkit: Open-source Bluetooth Classic vulnerability testing framework
- Your smart home may not be as secure as you think
- Attackers are targeting CrushFTP vulnerability with public PoC (CVE-2025-2825)
- Building a reasonable cyber defense program