Doug Drinkwater

Doug is the international editor of TabTimes.com.

6 use cases for blockchain in security

6 ways hackers will use machine learning to launch attacks

6 ways hackers will use machine learning to launch attacks

Machine learning algorithms will improve security solutions, helping human analysts triage threats and close vulnerabilities quicker. But they are also going to help threat actors launch bigger, more complex attacks.

What is DevSecOps? Developing more secure applications

What is DevSecOps? Developing more secure applications

DevSecOps is about introducing security earlier in the life cycle of application development, thus minimizing vulnerabilities and bringing security closer to IT and business objectives.

5 top machine learning use cases for security

5 top machine learning use cases for security

Machine learning will make sense of the security threats your organization faces and help your staff focus on more valuable, strategic tasks. It could also be the answer to the next WannaCry.

What is quantum encryption? It’s no silver bullet, but could improve security

What is quantum encryption? It’s no silver bullet, but could improve security

In the arms race between white and black hats, the infosec industry looks to quantum encryption and quantum key distribution (QKD). That may be just part of the answer, however.

Famous malware threats: Where are they now?

Famous malware threats: Where are they now?

The headlines may be dominated by news of NotPeyta and Wannacry, but watch out for the ‘golden oldie’ malware like Conficker and Zeus. They are still dangerous.

Preparing for GDPR compliance: Where you need to be now and how to get there

Preparing for GDPR compliance: Where you need to be now and how to get there

Failure to comply with the EU General Data Protection Regulation (GDPR) leaves firms vulnerable to penalties, but many U.S. companies doing business in Europe are in danger of missing the deadline. Here’s how to catch up.

Red team versus blue team: How to run an effective simulation

Red team versus blue team: How to run an effective simulation

Playing the role of an attacker can make your team better at defense. Learn how in our step-by-step guide to war gaming your security infrastructure — from involving the right people to weighing a hypothetical vs. live event.

10 steps for a successful incident response plan

10 steps for a successful incident response plan

Incident response plans are often left unused, leaving firms far less able to detect and respond to cyber attacks or data breaches. Here’s our 10-point plan to ensure you set up -- or improve -- an IR plan that actually works.

How to stop wasting money on security shelfware

How to stop wasting money on security shelfware

Investing in security tools that end-up on the shelf or underutilized is not inevitable, and it can be reduced or even eliminated by some proactive and surprisingly simple first steps.

How and why to hire a CISO

How and why to hire a CISO

If you haven't yet hired a chief information security officer, you're not alone. Here are the considerations for creating the position and making the hire.

What's the key to surviving as a cyber-security start-up?

What's the key to surviving as a cyber-security start-up?

It’s always a gamble to establish a start-up, but if you were to choose any sector where you’d fancy your chances of success, it would surely be cyber-security.

Load More