Expert analysis
Top 3 security, privacy and data protection trends for 2015
2014 was full of front page stories about data privacy, hacks, data jurisdiction and other threats that confirmed security is no longer a niche. Security is officially a …
Improving your readiness for OCR audits
In the wake of healthcare data breaches, OCR audits for HIPAA compliance have become more common – and the consequences have been more highly publicized. But many …
What to expect in the unpredictable world of IT security?
2014 has been particularly busy for IT security professionals. Many of the threats that we predicted at the start of the year duly emerged, while other significant issues …
Preparing for an information audit
A constant concern of many organizations is how to improve security or ensure that they meet audit needs. Though this is a top concern, they assume that any type of solution …
Leveraging network intelligence and deep packet inspection
Tomer Saban is the CEO of WireX Systems, a provider of network intelligence solutions. In this interview he talks about how deep packet inspection helps with identifying …
The context-aware security lifecycle and the cloud
Ofer Wolf is the CEO at Sentrix, a provider of cloud-based web security solutions. In this interview he talks about the challenges of delivering enterprise-grade security, …
User behavior intelligence in the expanding supply chain
The Internet has dramatically increased the speed of commerce across the globe. Today, the interconnectedness of various businesses facilitates just-in-time manufacturing, …
How the threat landscape is shaping the network security business
Pat Calhoun is the Senior Vice President & General Manager, Network Security, at McAfee. In this interview he talks about constructing the strategic direction for …
Does cyber insurance help the CISO get a seat in the boardroom?
CISOs and cyber security leaders have long struggled to gain a voice in the boardroom. Shut out of leadership meetings and strategic decision-making, IT security has often …
Risk assessment benefits, best practices and pitfalls
Ryan Ward is CISO at Avatier. In this interview, he talks about the overlooked benefits of risk assessment, offers best practices for performing successful risk assessments, …
The evolution of threat detection and Big Data
Mark Gazit is the CEO of ThetaRay, a specialist in threat detection. In this interview he talks about leveraging Big Data to secure networks, the advantages of using …
Job description: Infosec Ranger at Pwnie Express
When I learned that well-known hacker and conference speaker Jayson Street decided to join the Pwnie Express team, I knew this was the perfect time for an interview. …
Featured news
Resources
Don't miss
- Job-seeking devs targeted with fake CrowdStrike offer via email
- January 2025 Patch Tuesday forecast: Changes coming in cybersecurity guidance
- The SBI fake banking app shows that SMS authentication has had its day
- Preventing the next ransomware attack with help from AI
- Banshee Stealer variant targets Russian-speaking macOS users