Structural integrity: Quantifying risk with security measurement
In my previous post, we set up the foundation for a risk quantification program. Many organizations have begun this part of their security strategy and are learning how to …
SD-WAN alone cannot address the networking challenges of digital business
Enterprise IT professionals are turning to managed services for their SD-WAN deployments. At the same time, a new Cato Networks survey finds legacy telco services inadequately …
Network automation market expected to grow to $16.9 billion by 2022
According to market research by MarketsandMarkets, the network automation market size is expected to grow from $2.3 billion in 2017 to $16.9 billion by 2022, at a Compound …
GitHub introduces Dependabot-powered automated security fixes
GitHub, the largest code-hosting site in the world, has announced many new features and changes at the 2019 GitHub Satellite conference that took place last week in Berlin. …
Handle personal data: What we forget is as important as what we remember
This spring, Facebook addressed the issue of permanence across its messaging platforms – from Instagram to Messenger to WhatsApp – with the aim to “set a new standard” for …
How to diminish the great threat of legacy apps
The Equifax breach underscored the risk posed by unpatched software applications. As a refresher, 146 million customer records were exposed after a known vulnerability in …
Most global workers noticed stricter policies at work as a result of GDPR
When enforcement of the GDPR went into effect on May 25, 2018, it had worldwide implications on data protection and privacy legislation. One year later, there are conflicting …
Volume and quality of training data are the largest barriers to applying machine learning
IDC predicts worldwide spending on artificial intelligence (AI) systems will reach $35.8 billion in 2019, and 84% of enterprises believe investing in AI will lead to greater …
How many adults trust companies with their personal data?
More than one third (36%) of adults aged 16–75 trust companies and organizations with their personal data more since GDPR came into effect one year ago, according to TrustArc. …
Week in review: BlueKeep vulnerability, preventing Google account takeovers
Here’s an overview of some of last week’s most interesting news and articles: Data privacy: A hot-button issue for Americans one year after GDPR In recognition of …
US charges Assange with 17 counts under Espionage Act
The US Department of Justice has hit WikiLeaks founder Julian Assange with 17 charges related to illegally obtaining, receiving and disclosing classified information related …
How mainstream media coverage affects vulnerability management
For better or for worse, mainstream media is increasingly covering particularly dangerous, widespread or otherwise notable security vulnerabilities. The growing coverage has …
Featured news
Resources
Don't miss
- Building trust in AI: How to keep humans in control of cybersecurity
- Researchers expose large-scale YouTube malware distribution network
- Lanscope Endpoint Manager vulnerability exploited in zero-day attacks (CVE-2025-61932)
- Critical Adobe Commerce, Magento vulnerability under attack (CVE-2025-54236)
- Faster LLM tool routing comes with new security considerations