Expert analysis
The context-aware security lifecycle and the cloud
Ofer Wolf is the CEO at Sentrix, a provider of cloud-based web security solutions. In this interview he talks about the challenges of delivering enterprise-grade security, …
User behavior intelligence in the expanding supply chain
The Internet has dramatically increased the speed of commerce across the globe. Today, the interconnectedness of various businesses facilitates just-in-time manufacturing, …
How the threat landscape is shaping the network security business
Pat Calhoun is the Senior Vice President & General Manager, Network Security, at McAfee. In this interview he talks about constructing the strategic direction for …
Does cyber insurance help the CISO get a seat in the boardroom?
CISOs and cyber security leaders have long struggled to gain a voice in the boardroom. Shut out of leadership meetings and strategic decision-making, IT security has often …
Risk assessment benefits, best practices and pitfalls
Ryan Ward is CISO at Avatier. In this interview, he talks about the overlooked benefits of risk assessment, offers best practices for performing successful risk assessments, …
The evolution of threat detection and Big Data
Mark Gazit is the CEO of ThetaRay, a specialist in threat detection. In this interview he talks about leveraging Big Data to secure networks, the advantages of using …
Job description: Infosec Ranger at Pwnie Express
When I learned that well-known hacker and conference speaker Jayson Street decided to join the Pwnie Express team, I knew this was the perfect time for an interview. …
Enabling secure file sharing in the enterprise
As enterprise mobility meets collaboration, the workplace as we know it is transforming. Gone are the days when employees stopped working after leaving the office or …
The most unpopular person in the room
That’s me. At least I was the week I wrote this. I had the wonderful opportunity to speak at a number of conferences that were not solely related to security. It was …
Shaping mobile security
Most of us are familiar with the “triangle’ project management model, which highlights the constraints on delivering results in projects. The three corners of the …
Infosec industry: Time to put up or shut up
The information security industry is one of the most exciting industries to be involved in. It offers many opportunities to exercise one’s passion and curiosity about …
Vigilance and the Enterprise of Things
Most enterprises allow BYOD in their environment, with varying levels of supervision. Typically, these are tablets and smartphones but the number of other Internet of Things …
Featured news
Sponsored
Don't miss
- Black Friday shoppers targeted with thousands of fraudulent online stores
- RomCom hackers chained Firefox and Windows zero-days to deliver backdoor
- How to recognize employment fraud before it becomes a security issue
- Practical strategies to build an inclusive culture in cybersecurity
- Domain security posture of Forbes Global 2000 companies