red padlock cybersecurity threat ransomeware
20161101 cisco logo sign with clouds at partner summit 2016

security risk - phishing / malware / social engineering

8 types of malware and how to recognize them

Think you know your malware? Here's a refresher to make sure you know what you're talking about — with basic advice for finding and removing malware when you've been hit

executive superimposed on buildings leadership

What makes CISOs successful?

Leadership and communication skills top the list of what's needed to succeed as a chief information security officer (CISO), while technical skills aren’t nearly as important.

endpoint protection gears

The new endpoint security market: Growing in size and scope

Massive funding rounds by CrowdStrike and Cylance demonstrate that endpoint security may be the tip of the cybersecurity spear.

network security locks and cables

Moving to central network security policy management for hybrid clouds

With controls built into the infrastructure, the industry is headed toward central network security policy management (and reporting).

blue padlock in circle pixels digital security padlock

The rise of analyst-centric security operations technologies

The shift of technology to meet analyst needs has altered the infosec market -- for the better.

containers port ship boat

Containers are here. What about container security?

ESG data indicates that cybersecurity pros have problems around the nuances of container technology and implementing container-centric security controls.

futuristic security interface

The evolution of security operations, automation and orchestration

Basic functionality of SOAR products is being supplemented with strong integration, canned runbooks, and case management.

cloud computing - public, private; open, locked

Cloud computing security chaos continued at RSA Conference 2018

Cloud security has growing needs and lots of challenges. Here are some thoughts on solutions and strategies.

security threats and vulnerabilities

5 signs you've been hit with an advanced persistent threat (APT)

Do you have valuable data on your network? Noticing odd network behavior? You could be the victim of an APT attack

security threats and vulnerabilities

How a vulnerability disclosure policy lets hackers help you

Does your company have a vulnerability disclosure policy (VPD)? And if not, what might it mean for your security?

template c100.00 00 01 04.still001

12 reasons why digital transformation fails in the enterprise

Lack of CEO sponsorship, talent deficiency, resistance to change — if you’ve encountered any of the following issues, you may want to rethink your digital transformation before it grinds to a standstill.

European Union [EU] flag and binary code

GDPR: Look out for 'right to be forgotten storms' ahead

Thousands of EU citizens may ask data controllers to erase their records by the end of May. Will organizations be ready for this coming GDPR storm?

security network virtual display

3 areas in which CISOs are becoming more proactive

Security executives are taking a hands-on approach in areas such as threat intelligence, privacy, and business initiatives.

endpoint protection gears

Endpoint security suites must detect/prevent threats AND ease operations

Organizations want better threat prevention/detection, but only if new endpoint security tools can help automate and simplify operations, too.

‘Sakawa boys’: Meet the professional internet fraudsters of Ghana

In Ghana and Nigeria internet fraud is an increasingly common way for young people to make money

vulnerable gdpr breach security cyber attack

GDPR is coming, and many organizations aren’t ready

Many firms still need to deploy security controls and implement solid incident response plans to meet the GDPR deadline in May

Load More