Dan Swinhoe

GDPR, I choose you! How the Pokémon Company embraces security and privacy by design

The state of ICS and IIoT security in 2019

The state of ICS and IIoT security in 2019

Industrial control systems continue to be soft targets due to poor cyber hygiene. New study identifies what's wrong and best practices for fixing it.

Why fake data is a serious IoT security concern

Why fake data is a serious IoT security concern

IoT devices create massive amounts of data, all which could be polluted to throw off operations, business decisions, and even machine learning models.

Automating security at AWS: How Amazon Web Services operates with no SOC

Automating security at AWS: How Amazon Web Services operates with no SOC

Amazon Web Services CISO Stephen Schmidt explains the company's recipe for combining security automation with ways to get management and staff to take security seriously.

Biggest data breach penalties for 2018

Biggest data breach penalties for 2018

Hacks and data thefts, enabled by weak security, cover-ups or avoidable mistakes, have cost these eight companies a total of nearly $280 million and counting.

7 places to find threat intel beyond vulnerability databases

7 places to find threat intel beyond vulnerability databases

National Vulnerability Databases (NVDs) can be slow and miss things. Use these sources to supplement your threat and vulnerability intelligence efforts.

7 best practices for negotiating ransomware payments

7 best practices for negotiating ransomware payments

Sometimes companies are forced to meet cyber criminals’ ransom or extortion demands. This advice will give you your best chance to get your data back and preserve your reputation.

What are blockchain’s smart contracts? And how to secure them

What are blockchain’s smart contracts? And how to secure them

Smart contracts are moving into the enterprise, but they aren’t bulletproof. These are the vulnerabilities and best practices for securing them.

The Options Clearing Corporation taps AI to stay ahead of hackers

The Options Clearing Corporation taps AI to stay ahead of hackers

OCC uses machine learning and AI to understand and model how attackers could enter and move around the network.

Cybercriminals are using blockchain to improve security. Should you?

Cybercriminals are using blockchain to improve security. Should you?

Business-minded hackers are testing blockchain technologies to secure their illegal operations. Here's what enterprises can learn from them.

What is the cost of a data breach?

What is the cost of a data breach?

These are the factors that determine the cost of a breach, along with advice for minimizing their impact.

6 ways companies fail at security fundamentals

6 ways companies fail at security fundamentals

A new report suggests many organizations are failing in the basic cyber hygiene efforts and leaving themselves exposed to hackers.

Load More