Expert analysis
You can’t stop what you can’t see: Mitigating third-party vendor risk
Third-party vendors are a liability for host organizations, often unwittingly creating backdoors and exposing sensitive data. In fact, according to the Ponemon Institute …
An Internet of Things wish list for 2016
I’ve been writing about the Internet of Things for a while now, both from the perspective of the great opportunities that the IoT offers and the very real pressure it will put …
Demanding accountability: The need for cyber liability
GCHQ director Robert Hannigan pulled no punches last month when he stated that the free market is failing cybersecurity. And with 90% of large organisations and 74% of small …
Will IT security be different next year?
It is that time of the year again where we delve into the back of the cupboard and dust off the crystal ball as we make our predictions for the year ahead. This annual ritual …
Facebook drops Flash, adding one more reason for users to stop using it altogether
Facebook recently announced it stopped using Adobe Flash for web videos that appear on its News Feed, Pages and the embedded Facebook video player, instead deploying a video …
Top trends that will influence your security decisions in 2016
With 2016 almost here, many of us are making critical decisions regarding new security projects. Determining just where to focus and spend our limited resources is never easy, …
Blockchain transactions create risks for financial services
Trust is the most valuable commodity in the digital age. Failure to trust the systems or organizations in which we place our digital assets leads us to look at alternate …
Driving an industry towards secure code
The German government made an unprecedented move this week by issuing requirements for all new vehicles’ software to be made accessible to country regulators to ensure that …
Rackspace CSO on security: It’s time to go back to the fundamentals
Although less sexy, it is time to get back to the fundamentals. And it is this call to action that forms the basis of my 2016 predictions. Simplify and streamline security: …
How to eliminate encryption silos
Working in the encryption business, you’ll quickly learn that there are a number of problems that organizations can run into while deploying the technology. The …
Is Hadoop secure enough for the enterprise?
An ever-increasing number of organisations are turning to big data to gain valuable insight that can be immediately acted on to increase revenue, lower operating costs, or …
Inside job: 6 ways employees pose an insider threat
CISOs and CIOs have seen the prospects of losing control over data and the accompanying data privacy and security concerns as the biggest hurdle to cloud adoption. According …
Featured news
Resources
Don't miss
- Job-seeking devs targeted with fake CrowdStrike offer via email
- January 2025 Patch Tuesday forecast: Changes coming in cybersecurity guidance
- The SBI fake banking app shows that SMS authentication has had its day
- Preventing the next ransomware attack with help from AI
- Banshee Stealer variant targets Russian-speaking macOS users