Please turn on your JavaScript for this page to function normally.
tools
Risk assessment: The first step in improving cyber security

Despite the proliferation of high profile cyber-attacks over the last 18 months, many organisations are still too disorganised in their approach to security. While it is no …

hunt
Extortion-based cyber attacks: The next evolution in profit-motivated attack strategies

Today, data breaches have impacted just about every industry possible. From entertainment to the restaurant industry, no sector or organization appears to be safe, and it has …

BEC scams
BEC scammers stealing millions from home buyers

Business Email Compromise (BEC) scams have been on the rise for the last few years, and no industry is safe from these scammers. It has been revealed last week that art …

up
Is trading resilience for business growth a smart strategy?

Not long ago, the probability of a threat materializing was enough to open the IT pocketbook. Today, the mentality has shifted from one of risk prevention to one of risk …

shift digital business
Top 10 ways to fund the shift to digital business

With many options for digital business transformation requiring significant investment, Gartner has identified the top 10 ways to fund the shift to digital business. According …

patch
Infosec expert viewpoint: Vulnerability patching

Vulnerability patching is one of the most useful and cost-effective methods to mitigate a plethora of security threats. Here’s what infosec experts think about the …

learn
Modernizing cybersecurity training for the next generation

Equifax, Verizon, Molina Healthcare, Deloitte, Whole Foods, Wendy’s… it seems like every time we turn on the television another high-profile data breach is being …

mobile work
The mobile workforce: Productive, but susceptible to data compromise

An enterprise’s biggest problem when it comes to data compromise isn’t just technologies that are vulnerable, it’s how their employees use technology. Digital transformation, …

bulb
7 tips to reduce risks of data breaches

A recent study conducted by Forrester Consulting found that two-thirds of organizations have been breached five times in the past two years. It’s clear that traditional …

GDPR
The clock is ticking on GDPR: Is your business ready?

Despite having almost two years to prepare for the General Data Protection Regulation (GDPR), there are companies across the globe that have done little, if anything, to avoid …

Chris Eng
Chris Eng: An infosec journey from offense to defense

“Come to my lab, I promise you’ll learn something cool,” a friend told Chris Eng. Within a couple of hours, he had walked him through writing an exploit for …

laptop
Secure remote browsing: A different approach to thwart ever-changing threats

A defense-in-depth strategy is essential to modern enterprises, and organizations must deepen their defenses as quickly as possible to fully protect themselves. One promising …

Don't miss

Cybersecurity news