Please turn on your JavaScript for this page to function normally.
abstract
DLP APIs: The next frontier for Data Loss Prevention

According to the Breach Level Index, there have been 7,094,922,061 data records lost or stolen since 2013 with 4,417,760 records lost or stolen every day, 184,073 records …

container
Keys, tokens and too much trust found in container images

We are all aware of the risks introduced by good old third party code. Where would we be without it? Apparently not very far. It is estimated that between 30 to 70 percent of …

stop
Where does the cyber security buck stop?

Late last year, Bruce Schneier testified before the U.S. House Energy and Commerce committee asking them to consider imposing security regulations on the Internet of Things …

success
Building a strong cybersecurity program for the long haul

Patch Tuesday is approaching and there is a chance it might be a boring one. Hopefully, I didn’t jinx things by saying that, but I think most of what we’ll see is a bit of …

idea
It’s time for a common sense security framework

Privacy Rights Clearinghouse maintains a database of every data breach made public since 2005, and as the total number of records rapidly approaches one billion, board …

GDPR
Balancing act: Ensuring compliance with GDPR and US regulations

The impending GDPR, which will go into effect in a little less than a year from now, is going to have a significant impact on enterprise cybersecurity and data governance …

idea
5 incident response practices that keep enterprises from adapting to new threats

Security analysts within enterprises are living a nightmare that never ends. 24 hours a day, their organizations are being attacked by outside (and sometimes inside) …

construction
How to build a better SOC team

The security skills shortage is a very real issue. Cisco estimates that there are currently one million unfilled cyber security jobs worldwide, while a report from Frost …

locks
Breaking TLS: Good or bad for security?

As the use of TLS by malware and phishing increases, some security practitioners are seeking solutions to break TLS so they can monitor all traffic in and out of their …

architecture
How to secure your digital transformation

Organizations are demanding and implementing new solutions that enable them to streamline operations, cultivate new business opportunities and provide better service to their …

cloud
Protecting your cloud from ransomware

For enterprises that use the cloud, the key to being protected starts with understanding the layers that make up the components of their cloud stack. These different layers …

Windows
WannaCry is a painful reminder of why enterprises must stay current on software updates

WannaCry is a wake-up call for the excessive numbers of companies needlessly dragging their feet over Windows 10 migrations. Certainly since Friday, we’ve seen an upswing in …

Don't miss

Cybersecurity news