Expert analysis

Supply chain examination: Planning for vulnerabilities you can’t control
Seemingly, there are numerous occurrences when the customer’s personally identifiable information stored by an organization’s third-party provider is set loose by malicious …

Prevent credential stuffing and account takeover attacks with these expert tips
Account takeover and credential stuffing attacks are two security threats that often go hand in hand. Both have become alarmingly prominent: a recent report found that …

Cybersecurity company benefits should reduce stress but don’t
From start-ups to Silicon Valley giants, tech company employees work in some of the most luxurious offices in the world, especially as the best of businesses battle to attract …

Pain points for CTOs: A primer of the most stressful aspects of the job
The role of chief technology officer is evolving quickly because of the current spate of technology and its development. Not so long ago, CTOs focused heavily on IT operations …

Five cybersecurity certifications that provide value to employers
The cybersecurity skills gap and talent shortage continue to widen year over year as the result of a proverbial square peg and round hole situation. The peg: prospective …

How can financial institutions prevent shopping season fraud?
Black Friday and Cyber Monday are two of the years’ busiest shopping days. For consumers and retailers alike, it marks the beginning of the winter holiday shopping season, as …

There’s no way to fill the data skills gap, what now?
A recent survey of 100 UK CIOs found that 76% are worried about recruiting the IT staff they need to remain competitive. They’re right to be worried. The European Commission …

The overlooked part of an infosec strategy: Cyber insurance underwriting
When a data breach or cyber attack hits the headlines one of the last things businesses are likely to consider is how cyber insurance could helped. Outside of a general …

Women in cybersecurity can benefit from taking inventory of their personal apps
Today, technology fits into the palm of our hand. We have become accustomed to turning to it to find all sorts of answers to everyday challenges such as where to eat, where to …

California IoT security law: What it means and why it matters
In September, California Governor Jerry Brown signed into law a new bill aimed at regulating the security of IoT devices, and it’s set to go into effect in a few short months …

Want to build a successful SOC? Here’s what you need to know
There is no arguing the fact that networks are continually growing in complexity and the cyberattack surface is constantly expanding. A critical step in building a stronger …

Redefining security KPIs for 5G service providers
Telco security professionals are missing the mark when understanding their consumers’ priorities, according to KPMG’s recent report. In the wake of a security breach, …