Please turn on your JavaScript for this page to function normally.
The multiple benefits of IT auditing

Regulatory compliance requirements provide instructions for organizations on how to protect the data of their employees, business operations, and customers that are stored on …

Behavioral biometrics: The password you can’t forget

This year’s Mobile World Congress featured more biometrics technology than ever before, with the launch of Google’s Android Pay and Samsung Pay both unveiling …

Banks and IT security: The elements of success

In this interview, Nathan Horn-Mitchem, VP, Information Security Officer at Provident Bank, talks about delivering and maintaining IT security for 80 branches of the bank, …

Data lurking: How to protect your company against overlooked insider threats

Enterprises often fear hackers as their number one security threat. However, they should be more scared of what happens internally. More often than not, data breaches come …

Implementing an effective risk management framework

In today’s marketplace, almost every employee is now a content contributor. Although beneficial to the collective of information available, this influx brings about new …

Four advantages of an identity behavior-based approach to cybersecurity

With an ever-increasing number of data breaches, more money is being poured into IT security budgets. According to Gartner, the average global security budget increased 8 …

Protecting the critical infrastructure: Strategies, challenges and regulation

In this interview, Raj Samani, VP and CTO EMEA at Intel Security, talks about successful information security strategies aimed at the critical infrastructure, government …

Trumping cybercriminals during tax season: Tips on how to stay safe

Tax season is stressful for many reasons and April 15 equals a headache for many Americans. In addition to wading through taxes, tax season also opens up a new vector in which …

Why you shouldn’t ignore change auditing

Rupesh Kumar is the Director of Lepide Software. In this interview, he discusses the benefits of change auditing. What are the benefits of using change auditing? What security …

Signature antivirus’ dirty little secret

If you rely only on traditional, signature-based antivirus, you are going to get infected—and probably a lot! Antivirus was, and still is, a valuable addition to your layered …

Do your attackers know your network better than you?

Cyber crime is a lucrative business. In fact, to make the cyber attack as profitable as possible and to minimize the risk of getting caught, attackers and black hat hackers …

Why senior managers need to be involved in data security

The networking environment has changed radically in recent times. In today’s world of increasing wireless use, widespread BYOD, more home working, more remote access, …

Don't miss

Cybersecurity news