Please turn on your JavaScript for this page to function normally.
Abstract
IoT: A hacker’s dream come true?

There’s a lot more to the web than the cat-video-laden sites we normally see. In fact, according to most sources, the web that we can typically get to via our browser of …

doctor
Is your business still HIPAA compliant after the 2016 federal changes?

The U.S. Department of Health and Human Services’ Office for Civil Rights (OCR) warned healthcare professionals and their business associates of its intention to launch …

Amazon Echo
As voice interaction increases, what will security look like in the next 5 years?

Things are getting chatty – everywhere. In Mary Meeker’s recent annual report on the State of the Internet, she dedicated a chunk of it to the liftoff of the voice interface. …

energy
How to secure critical utilities

Over the past few years the issue of cybersecurity and the threat of hackers stealing data has increased tenfold. Not a day goes by without a breach being reported of a …

EU
Preparing for new EU cybersecurity rules and regulations

Recently, the European Parliament signed off on its first ever set of cybersecurity rules. The Network and Information Security (NIS) Directive spells the end of more than …

Black Hat USA 2016
Three topics everyone will be talking about at Black Hat USA 2016

There has never been a more interesting or daunting time to be in security. We have the proliferation of connected devices and a digitally connected global economy, colliding …

Connect
Cyber synergy: The need for collaborative cyber intelligence

It’s official – cybercrime now has a bigger impact than any other form of crime in the UK. That’s the conclusion drawn by the National Crime Agency (NCA) and Strategic Cyber …

Businessman
Security in the M&A process: Have you done your technical due diligence?

Company acquisitions are common in the cyber security market. Whether you are attempting to bolster your strategic position or looking to acquire the best talent, chances are …

Rio 2016 tickets
Rio 2016: The world is watching, especially hackers

When each nation’s best athletes compete at the Olympic Games, one city seemingly becomes the center of the universe. And while we look on closely—captivated by the …

Laptop
The damaging divide in application security

It’s time to get serious about application security and the divisive reality of breaches. Even with today’s intense focus on security, web application attacks are on the rise: …

collaboration
Keys to successful security vendor collaboration

The IT manager tasked with understanding today’s complex vendor landscape is in an unenviable position. The rapid proliferation of new types of cyber security threats and …

EU flags
The EU-US Privacy Shield: What happens next?

Yesterday the European Commission formally approved the EU-US Privacy Shield, making transfers of personal data to the US legal under European law for companies that have …

Don't miss

Cybersecurity news