minecraft illagers
08 lawsuit

inside hack theft

China's theft of IBM's intellectual property

Guilty plea of Xu Jiaqiang an IBM employee for theft of intellectual property and economic espioange

iran map

Iran espionage capabilities have a powerful bite

Look at the threat posed by IRAN to the United States and elsewhere

retail shopping cart commerce

Why existing solutions let security leaders maximize value

Eddy Bobritsky explains why existing solutions create the opportunity to maximize value before looking for something new

oval office white house

With risk accountability, and a resilient, sustainable cyber workforce for all...

Cyber security within the public sector is at a critical juncture. The recently signed executive order on cybersecurity is a promising development.

internet of things data

How 'smart cities' push IoT cybersecurity for state and local IT

The internet of things is at a much more mature place at the state and local level than it is in the federal government or even private industry. It’s a balancing act, clearly, between government leaders working to implement IoT...

cloud computing data center

DevOps and cloud infrastructure permutations

The cloud has one DevOps advantage - it limits the number of permutations of storage, network, and CPU combinations that can be used for infrastructure (IaaS).

industrial refinery energy plant oil gas

Researchers and defenders needed in IIoT

Strategies to overcome the complexity of patching vulnerabilities in critical infrastructure

cloud blueprint schematic

Achieving compliance in the cloud

More and more organizations are moving towards cloud technologies for scalability, cost reduction, and new service offerings. In this short article we will review cloud basics and look at auditing for compliance challenges.

ransomware contained container

Your data has been kidnapped… now what?

If you think you're not a target for a cyberattack recent "ransomware" incidents should make you think again. Ransomware attacks are different than what most people perceive as a cyberattack. There's no theft of data or interest in...

1 ceo target threat

Did Kaspersky step in dog-doo?

How did Kaspersky find themselves in the cross hairs of the US intelligence community

screen shot 2017 05 12 at 10.35.58 am

3 Things I want to see at Google I/O

Google I/O is set to kick off in just a few days, so here are three things we hope to see.

mike rogers daniel coates mike pompeo

Worldwide threat assessment - The Director National Intelligence's view

Director National Intelligence presented his state of the global threats to the United States to the US Senate Select Committee on Intelligence.

glass tower office building sky enterprise

Are venture capitalists the new stewards of modern security research and development?

Is the innovation you seek available from the security startup you don’t know about yet?

1 tracking hunting dogs horse

The Knights Fork: Hunting the hunter

The true ROI of cybersecurity investment is the delta in dwell time. There is direct correlation between cybersecurity investment and brand protection. Hunting gives an organization the opportunity to turn the tables on an adversary....

carrot stick incentives money

With security awareness, money talks

One problem with what we tell employees about taking security precautions is that the precautions interfere with their jobs.

name badges hello

Security leaders can unite the business around identity

Kevin Cunningham shares insights on why identity is a smart way to bring your business colleagues together to support security efforts

email cloud

Email, email, in the cloud

The transition from on-premises to cloud-based email is an opportunity to tighten security controls.

Group of diverse women standing lined up in a row

Women in cybersecurity need to take more risks

Projecting confidence and taking risk are keys to success for women in cyber

Load More