Expert analysis
The new CISO imperative: Solving the information management paradox
In the drive to become more cyber resilient in 2017, organizations are extending risk management that is traditionally based on parametric measures (i.e., data loss prevention …
How to create a safer shopping experience
The annual holiday season has arrived. The air grows crisp (at least in the Northern hemisphere), new, cool gadgets are released and cyberattacks, along with cologne ads, …
Six tips for practicing safe social media
With Facebook now counting over 1.7 billion monthly users and LinkedIn another 467 million, it was only a matter of time until criminal hackers turned their attention to …
The early IoT gets the worm
Five days after the start of World War I, Sir Edward Grey, British Foreign Secretary, remarked to a close friend, “The lights are going out all over Europe, we shall not see …
Security startup confessions: Customer breach disclosure
My name is Kai Roer and I am a co-founder of European security startup CLTRe, and these are my confessions. I hope you will learn from my struggles, and appreciate the choices …
BYOD: How to provide secure access to network resources
IT organizations have little or no choice when it comes to Bring Your Own Device (BYOD) programs. Employees want to access the network with their personally owned devices, and …
What does a Trump presidency mean for cybersecurity?
Cybersecurity played a major role in this year’s election cycle. For the first time in American history, data breaches, email servers and encryption directly influenced who …
Network security: A team sport for SMBs
The increased volume and frequency of cyberattacks has made information security an everyday issue of great importance, regardless of your geographical location, industry, …
Six key principles for efficient cyber investigations
Many organizations today are not equipped to defend against traditional cyberattacks, as demonstrated by the ever-increasing numbers of successful breaches reported daily – …
How security collaboration will prove vital in 2017
The escalation of high-profile hacking and data dumps recently has underscored the increasing boldness of digital threat actors, culminating in July’s Democratic National …
The new age of quantum computing
Quantum encryption is the holy grail of truly secure communications. If and when quantum computing becomes a widespread reality, many public-key algorithms will become …
Weave a web of deception to secure data
Today’s technically superior and incredibly well-funded (often state-funded, in fact) hackers are not impressed with breach prevention and traditional security solutions. …
Featured news
Sponsored
Don't miss
- Black Friday shoppers targeted with thousands of fraudulent online stores
- RomCom hackers chained Firefox and Windows zero-days to deliver backdoor
- How to recognize employment fraud before it becomes a security issue
- Practical strategies to build an inclusive culture in cybersecurity
- Domain security posture of Forbes Global 2000 companies