Expert analysis
Security startup confessions: Looking for investors
My name is Kai Roer and I am a co-founder of European security startup CTLRe, and these are my confessions. I hope you will learn from my struggles, and appreciate the choices …
Post-pumpkin Patch Tuesday: What’s in store for November
There has been a lot of activity since October’s Patch Tuesday. During that short period of time, Oracle released its quarterly CPU, including an update for Java JRE; Adobe …
The digital world should mean a change in mindset on security for businesses
Businesses are often encouraged to take risks. These can fuel innovation, excite customers and set them apart from competitors. However, while many parts of a business may …
Building the IoT monster
When Mary Shelley wrote Frankenstein, she imagined the misguided doctor assembling his creature from dead body parts, who instead of elevating science, created something dark …
Understanding IoT botnets
If you were online on Friday October 21st, you were probably affected by the DDoS attack against managed DNS provider Dyn. Dyn observed that tens of millions of IP addresses …
Why don’t all businesses have a good continuity strategy?
It has been said that an ounce of prevention is worth a pound of cure. In the case of disaster recovery, however, businesses tend focus on prevention without anticipating the …
Federal regulators: Increasing cybersecurity stance on financial institutions
Everyone is increasing the attention of cybersecurity given the continued parade of hacking incidents. Just last week, the three main prudential regulators for financial …
Best practices for securing your data in-motion
Security and compliance is at the top of every IT pro’s mind, yet much of that effort is focused on protecting data within the organization that’s “at rest.” While it’s …
IoT security: Defending a young industry from attack
As the IoT industry matures, it’s safe to say we’re well past “early adopter” phase and seeing broader development and deployment. While the prospect of a more established and …
Four ways to keep data safe during election season
There is no shortage of passionate feelings among voters when it comes to this November’s presidential election. Those feelings extend tenfold to each candidate’s campaigns. …
Democracy for the Internet of Things
In the past I’ve written a number of times on the way that the IoT potentially changes the relationship between governments and their constituents – and a profound change that …
How to implement an EFSS ransomware recovery plan
Ransomware attacks are at an all-time high, and security experts warn it has become a matter of “when” not “if” your company will be breached. The number of victims has grown …
Featured news
Resources
Don't miss
- GitHub CISO on security strategy and collaborating with the open-source community
- Chainsaw: Open-source tool for hunting through Windows forensic artefacts
- Time for a change: Elevating developers’ security skills
- Job-seeking devs targeted with fake CrowdStrike offer via email
- January 2025 Patch Tuesday forecast: Changes coming in cybersecurity guidance