Expert analysis
Continuous monitoring for your perimeter
Qualys Continuous Monitoring is a next-generation cloud service that gives you the ability to identify threats and unexpected changes in your Internet perimeter before they …
API security for connecting the enterprise cloud
In this interview, Don Bergal, COO at Managed Methods, answers questions regarding security around API based connections between an enterprise and the hybrid cloud. What …
The dangers of backdoor passwords
In an increasingly connected world, backdoor passwords have large implications on the Internet of Things, the medical world and industrial control systems. While you might …
A walk through Black Hat USA 2014
Here’s a walk through video of the Business Hall at Black Hat USA 2014. The video features: Qualys Firemon iBoss Crowdstrike Palo Alto Networks Shape Security Pwnie …
Detect and respond
At a recent security and risk management conference I had an opportunity to talk with industry analysts about today’s challenges in network security. It seems that many …
The art and science of detecting emerging threats
In this interview, Stephen Huxter, COO at Darktrace, talks about the challenges involved in detecting emerging threats, Recursive Bayesian Estimation, the evolution of AI, and …
iOS security myths and threats
In this interview, Zuk Avraham, CEO of Zimperium, talks about iOS security myths and threats, discusses the difficulties in exploring iOS security vs. “breaking” …
How secure are today’s critical networks?
In this interview, Dr. Lutz J?¤nicke, CTO at Innominate Security Technologies, illustrates the security of critical networks, the regulatory mandates for organizations in the …
The role of the cloud in the modern security architecture
In this interview, Stephen Pao, General Manager, Security Business at Barracuda Networks, offers advice to CISOs concerned about moving the secure storage of their documents …
Failure is an option
Information is the lifeblood of today’s business world. With timely and accurate information business decisions can be made quickly and confidently. Thanks to modern …
How security analytics help identify and manage breaches
In this interview, Steve Dodson, CTO at Prelert, illustrates the importance of security analytics in today’s complex security architectures, talks about the most …
Looking at insider threats from the outside
Cybersecurity is a never-ending battle requiring around-the-clock attention. From malware to DDoS to APT attacks, front-line IT security teams are being constantly bombarded. …
Featured news
Resources
Don't miss
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption
- NetBird: Open-source network security
- Burnout in cybersecurity: How CISOs can protect their teams (and themselves)