Please turn on your JavaScript for this page to function normally.
team
Security startup confessions: Building a team

My name is Kai Roer and I am a co-founder of a European security startup, and these are my confessions. I hope you will learn from my struggles, and appreciate the choices …

magnifying glass
Analyze your data: Where is it and who has it?

It is becoming widely recognized that “unknown” data leakage of PCI data, and more broadly other Personally Identifiable Information, within enterprises is the highest value …

Businessman
How CISOs can work with the C-suite to define the cybersecurity risk level

Defining the cybersecurity risk level for any organization should be a collaborative effort that balances the need for risk mitigation with fiscal responsibility. Although the …

Brexit
Brexit security implications: Major, and only starting to unfold

The Brexit shock continues to reverberate throughout the global economic and policy worlds. Despite protests against the referendum’s results being cancelled due to concerns …

stairs
Control system security compliance: Assess risk before it’s too late

Cybercrime is no longer a problem restricted to IT. The Department of Homeland Security recently warned that thousands of industrial control systems (ICS) can be hacked …

ISO
Overcoming the barriers to ISO 27001 adoption for success on G-Cloud

A recent attention grabbing headline that was just too controversial to ignore: “Sloppy SaaS firms lose out on G-Cloud deals, research suggests”. In the article, …

pulse
Why are hackers increasingly targeting the healthcare industry?

Cyber-attacks in the healthcare environment are on the rise, with recent research suggesting that critical healthcare systems could be vulnerable to attack. In general, the …

Microsoft Wallet
Microsoft Wallet enters the mobile payments fray: Is the industry secure?

The launch of Microsoft Wallet for Windows 10 users this week marks the latest entry from a major OEM into an increasingly booming mobile payments market. The new offering is …

cloud computing
Where does your cloud data live? 3 questions to ask

There’s a common thread behind every security pro’s cloud-related fears: control. Whether your company’s infrastructure revolves around a cloud-centric strategy or regulates …

Binary
The hunting approach to defeating cyber attacks

Security used to be all about building walls around our organizations and trying to immediately stop all attacks. But today’s adversaries are sophisticated, persistent, and …

healthcare
Healthcare needs a data centric security approach

With increasing attacks on PHI data, coupled with more stringent data security requirements and regular audits, organizations should act now – before it’s too late. A recent …

CEO
How to assess your stakeholder matrix as part of a cloud security strategy

Running your organization in the cloud has many benefits: cost savings, efficiency gains, and the flexibility to scale, to name a few, along with some security drawbacks. This …

Don't miss

Cybersecurity news