Please turn on your JavaScript for this page to function normally.
IT job
Unplanned work makes it hard to deliver digital transformation

Time-critical, unplanned work caused by IT disruptions continues to plague enterprises around the world, leading to lost revenue, significant employee morale problems and …

world danger
Coronavirus: You don’t get a pass when it comes to cybersecurity

I was saddened to learn that two people who attended RSAC 2020 in San Francisco had subsequently tested positive for COVID-19. This virulent disease has impacted our lives …

Panorays CCPA
Guide: Supplier CCPA readiness for security and IT teams

It’s important for security and IT professionals to understand how the California Consumer Privacy Act (CCPA) will affect how they do their jobs. Businesses that fail to …

virus
Fake Covid-19 tracker app delivers ransomware, disinformation abounds

As Covid-19 spreads across the globe and countries do their best to slow down the infection rate, cybercriminals’ onslaught against worried users is getting more intense …

ProcessUnity
How organizations can maintain a third-party risk management program from day one

In this podcast recorded at RSA Conference 2020, Sean Cronin, CEO of ProcessUnity, talks about the importance of third-party risk management and how companies can get started …

Phishing
Phishing is a huge concern among security decision-makers and influencers

A serious disconnect exists between how decision makers (i.e., CISOs, CIOs and CEOs), and security practitioners (i.e., IT managers and directors, security architects and …

danger
Three actions to boost your organization’s resilience against coronavirus disruptions

With the spread of the coronavirus (COVID-19), CIOs should focus on three short-term actions to increase their organizations’ resilience against disruptions and prepare for …

5G
Can 5G make you more vulnerable to cyberattacks?

Many enterprises and sectors are unaware of the 5G security vulnerabilities that exist today. Choice IoT says it’s critical for businesses to have a plan for discovering and …

quantum
Early investment in quantum computing could result in a competitive advantage

Improved AI capabilities, accelerated business intelligence, and increased productivity and efficiency were the top expectations of organizations currently investing in …

abstract, generic
Week in review: Trojanized hacking tools, coronavirus scams, (IN)SECURE Magazine special issue

Here’s an overview of some of last week’s most interesting news, articles and podcasts: The haphazard response to COVID-19 demonstrates the value of enterprise …

open source
Number of open source vulnerabilities surged in 2019

The number of disclosed open source software vulnerabilities in 2019 reached over 6000, up from just over 4,000 in 2018, a new WhiteSource report says. “This can be …

user
The human element in security is still needed to combat application vulnerabilities

While over half of organizations use artificial intelligence or machine learning in their security stack, nearly 60 percent are still more confident in cyberthreat findings …

Don't miss

Cybersecurity news