Please turn on your JavaScript for this page to function normally.
magnifying glass
User behavior analytics: The equalizer for under-staffed security teams

In a perfect world, security professionals would see a few alerts, recognize the pattern, identify the malware and the hacker, and solve the problem – all with only a few …

Wireless
Wi-Fi and security are better together for SMBs

Wireless adoption is growing fast globally, with Wi-Fi access becoming ubiquitous in businesses, stores, corporate environments and public spaces; literally everywhere we go. …

Head
You can’t stop what you can’t see: Mitigating third-party vendor risk

Third-party vendors are a liability for host organizations, often unwittingly creating backdoors and exposing sensitive data. In fact, according to the Ponemon Institute …

IoT connection
An Internet of Things wish list for 2016

I’ve been writing about the Internet of Things for a while now, both from the perspective of the great opportunities that the IoT offers and the very real pressure it will put …

Demanding accountability: The need for cyber liability

GCHQ director Robert Hannigan pulled no punches last month when he stated that the free market is failing cybersecurity. And with 90% of large organisations and 74% of small …

universe
Will IT security be different next year?

It is that time of the year again where we delve into the back of the cupboard and dust off the crystal ball as we make our predictions for the year ahead. This annual ritual …

Facebook
Facebook drops Flash, adding one more reason for users to stop using it altogether

Facebook recently announced it stopped using Adobe Flash for web videos that appear on its News Feed, Pages and the embedded Facebook video player, instead deploying a video …

business
Top trends that will influence your security decisions in 2016

With 2016 almost here, many of us are making critical decisions regarding new security projects. Determining just where to focus and spend our limited resources is never easy, …

Bitcoin
Blockchain transactions create risks for financial services

Trust is the most valuable commodity in the digital age. Failure to trust the systems or organizations in which we place our digital assets leads us to look at alternate …

Volkswagen
Driving an industry towards secure code

The German government made an unprecedented move this week by issuing requirements for all new vehicles’ software to be made accessible to country regulators to ensure that …

Security
Rackspace CSO on security: It’s time to go back to the fundamentals

Although less sexy, it is time to get back to the fundamentals. And it is this call to action that forms the basis of my 2016 predictions. Simplify and streamline security: …

How to eliminate encryption silos

Working in the encryption business, you’ll quickly learn that there are a number of problems that organizations can run into while deploying the technology. The …

Don't miss

Cybersecurity news