Analyses

healthcare data breach ts

automation

Enterprise plans for security automation and orchestration

Organizations want to merge threat intelligence with internal security telemetry, add custom functionality for security operations, and automate remediation tasks.

23922465470 fe3c8b8cdf o

The 17 biggest data breaches of the 21st century

Security practitioners weigh in on the 17 worst data breaches in recent memory.

ai machine learning endpoint security big data

Artificial intelligence and cybersecurity: The real deal

AI will have a growing impact on cybersecurity technology as a helper app, not as a new product category.

binary cyberattack cybersecurity hacked protected

Endpoint detection and response is coming - in one form or another

Vendors are bundling endpoint detection and response (EDR) into endpoint security suites. CISOs want it, but they aren’t sure how to consume it.

Talent compass pointing to the most highly skilled jobs hiring

Research suggests cybersecurity skills shortage is getting worse

New data reveals growing skills gaps that represent an existential threat. What should organizations do?

network security digital internet firewall binary code

Endpoint security as a service will grow in 2018

Organizations want help with endpoint security areas, including data loss prevention, enterprise risk management, and threat hunting.

Security Shield

CISOs should examine commercial SOAPA offerings in 2018

Leading vendors are putting together proprietary SOAPA solutions. CISOs should establish an evaluation team tasked with looking for viable options.

career trends hot cold briefcase executive2

Why do CISOs change jobs so frequently?

Aside from earning more money, CISOs pursue other opportunities when current employers minimize cybersecurity commitments and efforts.

privacy please hotel room

17 steps to being completely anonymous online

The default state of internet privacy is a travesty. But if you're willing to work hard, you can experience the next best thing to absolute internet anonymity.

cybersecurity stock

Who's who in the cybersecurity market? The inside scoop for 2018

Big tech will go big on cybersecurity in 2018. Expect Amazon, Google, Microsoft and others to get tough on cyber crime.

wallet cash credit card pocket money belt

The truth about RFID credit card fraud

Despite demonstrations to show it's possible, documented cases of RFID credit card fraud are unknown. And as security professionals know, there is a huge gulf between potential crime and actual crime.

Europe trends 2018: GDPR may hit businesses hard

A big-picture look at what awaits Europe next year in terms of enterprise technology

career roadmap sysadmin

What defines job satisfaction for cybersecurity professionals?

To keep the information security team happy, organizations must offer competitive compensation, career advancement and a commitment to strong security.

Why cryptojacking is an overlooked security threat

How compute power from many organisations is being slyly diverted into cryptocurrency mining

top it skills primary

Cybersecurity professionals aren’t keeping up with training

While information security professionals agree that continuous training is important, they are too busy to keep up.

Is proposed US ‘hacking back’ law really going to help?

Legislation is at least raising the issue of proactive security tactics

What will be the single biggest security threat of 2018?

Our annual poll to find out what security professionals think the single biggest security threat of next year will be

surveillance video cameras

Are home security cameras ready for business use?

Thinking of buying a consumer IP camera for use as a surveillance system in your business? Read this first.

Load More