Analyses

containers port ship boat
futuristic security interface

cloud computing - public, private; open, locked

Cloud computing security chaos continued at RSA Conference 2018

Cloud security has growing needs and lots of challenges. Here are some thoughts on solutions and strategies.

security threats and vulnerabilities

5 signs you've been hit with an advanced persistent threat (APT)

Do you have valuable data on your network? Noticing odd network behavior? You could be the victim of an APT attack

security threats and vulnerabilities

How a vulnerability disclosure policy lets hackers help you

Does your company have a vulnerability disclosure policy (VPD)? And if not, what might it mean for your security?

template c100.00 00 01 04.still001
video

12 reasons why digital transformation fails in the enterprise

Lack of CEO sponsorship, talent deficiency, resistance to change — if you’ve encountered any of the following issues, you may want to rethink your digital transformation before it grinds to a standstill.

European Union [EU] flag and binary code

GDPR: Look out for 'right to be forgotten storms' ahead

Thousands of EU citizens may ask data controllers to erase their records by the end of May. Will organizations be ready for this coming GDPR storm?

security network virtual display

3 areas in which CISOs are becoming more proactive

Security executives are taking a hands-on approach in areas such as threat intelligence, privacy, and business initiatives.

endpoint protection gears

Endpoint security suites must detect/prevent threats AND ease operations

Organizations want better threat prevention/detection, but only if new endpoint security tools can help automate and simplify operations, too.

‘Sakawa boys’: Meet the professional internet fraudsters of Ghana

In Ghana and Nigeria internet fraud is an increasingly common way for young people to make money

vulnerable gdpr breach security cyber attack

GDPR is coming, and many organizations aren’t ready

Many firms still need to deploy security controls and implement solid incident response plans to meet the GDPR deadline in May

healthcare data breach ts

Why healthcare cybersecurity spending will exceed $65B over the next 5 years

Hospitals and healthcare providers remain under cyber attack, causing organizations to spend more to protect their systems and patient data.

NB-IoT
video

What is NB-IoT?

Narrowband IoT is the major wireless carriers' play to capture a significant chunk of the burgeoning enterprise IoT marketplace, even if the standard isn't quite ready for prime time yet. Here's a look at the technology that's coming...

automation

Enterprise plans for security automation and orchestration

Organizations want to merge threat intelligence with internal security telemetry, add custom functionality for security operations, and automate remediation tasks.

23922465470 fe3c8b8cdf o

The 17 biggest data breaches of the 21st century

Security practitioners weigh in on the 17 worst data breaches in recent memory.

ai machine learning endpoint security big data

Artificial intelligence and cybersecurity: The real deal

AI will have a growing impact on cybersecurity technology as a helper app, not as a new product category.

binary cyberattack cybersecurity hacked protected

Endpoint detection and response is coming - in one form or another

Vendors are bundling endpoint detection and response (EDR) into endpoint security suites. CISOs want it, but they aren’t sure how to consume it.

Talent compass pointing to the most highly skilled jobs hiring

Research suggests cybersecurity skills shortage is getting worse

New data reveals growing skills gaps that represent an existential threat. What should organizations do?

network security digital internet firewall binary code

Endpoint security as a service will grow in 2018

Organizations want help with endpoint security areas, including data loss prevention, enterprise risk management, and threat hunting.

Security Shield

CISOs should examine commercial SOAPA offerings in 2018

Leading vendors are putting together proprietary SOAPA solutions. CISOs should establish an evaluation team tasked with looking for viable options.

Load More