Expert analysis
The four myths hampering cybersecurity maturity
We’ve seen tremendous advances in technology over the last 15 years or so, but security continues to struggle as much today as it did a decade ago. A large part of the …
Discover hidden cybersecurity talent to solve your hiring crisis
Not having access to technical talent is a common complaint in the cybersecurity world. Folks with security experience on their resumes are in such high demand, CISOs need to …
GDPR quick guide: Why non-compliance could cost you big
If you conduct business in the EU, offer goods or services to, or monitor the online behavior of EU citizens, then the clock is ticking. You only have a few more months …
Why do we need a risk-based approach to authentication?
20 years ago, everyone worked at a desktop workstation hardwired into an office building. This made network security simple and organizations felt they could depend on the …
Love letters from a Black Hat to all the fools on the Internet
As an underground, “black hat” hacker, I don’t have time for significant others. I’m too busy earning stacks of cash to improve my Bitcoin mining rigs …
How to ensure your IT and security teams stay aligned amid digital transformation
Even for sensitive industries, the movement to cloud-based technologies is generally accepted as a cost-effective and efficient infrastructure strategy and immediate priority. …
February Patch Tuesday forecast: Key updates to act on
Love is in the air! Can’t you feel it? This Patch Tuesday falls the day before the most romantic day of the year – Valentine’s Day! We’ve been hearing …
Credential phishing kits target victims differently depending on location
There is a new attack vector in town – the customization of phishing kits. In a recent case uncovered by PhishMe Intelligence, a phishing kit was crafted to target …
UK data protection authority issues record fines
Since August 2015, The UK’s independent authority, The Information Commissioner’s Office, has fined 104 organisations a total of £8.7 million for breaches in data …
7 steps for getting your organization GDPR-ready
While the EU has had long established data protection standards and rules, its regulators haven’t truly commanded compliance until now. Under the General Data Protection …
Groundhog Day: Third-party cyber risk edition
Over the past four years, I’ve had countless conversations with hundreds of companies around third-party cyber risk issues. It’s been my personal Groundhog Day, so …
The future of smartphone security: Hardware isolation
Mobile spyware has become increasingly more ubiquitous in corporate networks and devices. In a 2017 study, Check Point has found that out of the 850 organizations that they …
Featured news
Resources
Don't miss
- GitHub CISO on security strategy and collaborating with the open-source community
- Chainsaw: Open-source tool for hunting through Windows forensic artefacts
- Time for a change: Elevating developers’ security skills
- Job-seeking devs targeted with fake CrowdStrike offer via email
- January 2025 Patch Tuesday forecast: Changes coming in cybersecurity guidance