Analyses

security threats and vulnerabilities
intro security vulnerability

tools / toolkit

The problems plaguing security point tools

Security point tools generate too many alerts, create a strain on operational resources, and make security operations complex and time consuming, new ESG research shows.

The 18 biggest data breaches of the 21st century

Security practitioners weigh in on the 18 worst data breaches in recent memory.

risk assessment - safety analysis - security audit

Cyber risk management continues to grow more difficult

Primary reasons why cyber risk management is more difficult include increasing workloads, sophisticated threats, and more demanding business executives.

risk assessment gauge

It's time for a new cyber risk management model

An overwhelming attack surface, voluminous vulnerabilities, sophisticated threats, and new business requirements demand a new cyber risk management model.

3 blockchain

Digital identity, the blockchain and the GDPR: A round peg in a square hole?

Can an immutable record and GDPR data subject rights co-exist? Why blockchain might not be able to deliver on data privacy requirements.

cyber security lock padlock firewall code breach password

8 features a cybersecurity technology platform must have

Cybersecurity professionals ranked the most important attributes of a cybersecurity technology platform according to strict definitions that meet their requirements.

10 cloud security breach virtualization wireless

Cybersecurity professional impressions on cloud-native security

Organization use cloud-native security controls, but they really want central management for cloud security across heterogeneous clouds.

binary chains / linked data / security / blockchain

Form factor wars: Cloud-based or on-premises security technologies?

While most organizations are willing to consider cloud-based or on-premises security solutions, nearly one-third still demand the control associated with on-premises.

sony pictures movie

The Sony hacker indictment: 5 lessons for IT security

The recent indictment of North Korean hacker Park Jin Hyok contains valuable information from the FBI’s investigation that will help you defend against similar attacks.

digital security concept > lock / keyhole / circuits / network connections

5 biggest cybersecurity challenges at smaller organizations

Manual processes, security complexity, and a lack of support from business management plague small and midsize businesses (SMBs).

chain links securing multiple transactions / big data / security / blockchain

CISOs recommend future actions for their organizations

More security goals for the business, formal security processes, and increased training top the list of recommendations from chief information security officers.

ransomware wannacry

What is WannaCry ransomware, how does it infect, and who was responsible?

Stolen government hacking tools, unpatched Windows systems, and shadowy North Korean operatives made WannaCry a perfect ransomware storm.

Network World: IoT Hacks [slide-06] > Lateral Attacks > Network access via a single breach point

The most important attributes of a cybersecurity platform

A cybersecurity platform should have coverage across major threat vectors, central management, and technologies for prevention, detection, and response in any security platform.

digital security concept > lock / keyhole / circuits / network connections

The transition toward enterprise-class cybersecurity vendors

Information security professionals working at enterprise organizations want to work with vendors that have experience with business/IT initiatives and industry knowledge.

Load More