Please turn on your JavaScript for this page to function normally.
geometry
The next frontier of cyber governance: Achieving resilience in the wake of NotPetya

Earlier this week, several European nations experienced a widespread ransomware attack. Major international giants, such as Merck, WPP, Rosneft, and AP Moller-Maersk, …

analyst
What makes a good security analyst: The character traits you need

Of all the skillsets IT decision-makers are looking to hire for, cybersecurity is easily the most challenging. According to Global Knowledge’s 10th annual IT Skills and Salary …

scalable
Making enterprise content management secure and scalable

Content is one of the most valuable commodities that any business owns. It’s the key driver of customer interactions, the foundation of core business processes, and it helps …

danger
With ransomware, pay up if you want to keep paying

A hospital CEO is contacted in the middle of the night with a dire warning. Hackers have taken control of computer systems used for patient care, CT scans, and lab work. The …

hand
Fostering a safe place for businesses to work in

It’s no secret that in the past few years, business leaders have begun to realise the potential of digital transformation to give their organisation a competitive edge. …

Business
Security startup confessions: Attending industry events

My name is Kai Roer and I am a co-founder of European security startup CLTRe, and these are my confessions. I hope you will learn from my struggles, and appreciate the choices …

center
Evaluating artificial intelligence and machine learning-based systems for cyber security

All indicators suggest that 2017 is shaping up to be the year of artificial intelligence and machine learning technology for cyber security. As with most trends in our …

abstract
DLP APIs: The next frontier for Data Loss Prevention

According to the Breach Level Index, there have been 7,094,922,061 data records lost or stolen since 2013 with 4,417,760 records lost or stolen every day, 184,073 records …

container
Keys, tokens and too much trust found in container images

We are all aware of the risks introduced by good old third party code. Where would we be without it? Apparently not very far. It is estimated that between 30 to 70 percent of …

stop
Where does the cyber security buck stop?

Late last year, Bruce Schneier testified before the U.S. House Energy and Commerce committee asking them to consider imposing security regulations on the Internet of Things …

success
Building a strong cybersecurity program for the long haul

Patch Tuesday is approaching and there is a chance it might be a boring one. Hopefully, I didn’t jinx things by saying that, but I think most of what we’ll see is a bit of …

idea
It’s time for a common sense security framework

Privacy Rights Clearinghouse maintains a database of every data breach made public since 2005, and as the total number of records rapidly approaches one billion, board …

Don't miss

Cybersecurity news