6 steps for building a robust incident response plan

6 steps for building a robust incident response plan

While a lot of energy is put it into avoiding security breaches, it’s not always possible. A solid incident response plan can restrict damage, reduce recovery time and limit the associated costs.

09/20/18

5 tips for better cloud security

5 tips for better cloud security

As cloud adoption soars to new heights, security standards have failed to keep pace. Organizations need to start taking responsibility for their own cloud security and these five practical tips will help.

09/11/18

Get serious about consumer data protection

Get serious about consumer data protection

With the CCPA coming hot on the heels of the GDPR it makes sense to get your consumer data management in order. Taking steps to protect all private data today will pay dividends tomorrow.

08/14/18

8 steps to secure unmanaged devices in the enterprise

8 steps to secure unmanaged devices in the enterprise

As more and more exploitable endpoints find their way onto our networks we need to act to secure them. This article will highlight practical strategies to help you secure IoT, mobile and other devices that require attention.

07/17/18

10 ways to prevent, detect and recover from ransomware and zeroday threats

10 ways to prevent, detect and recover from ransomware and zeroday threats

As ransomware runs rife the threat of extortion and disruption looms large. Find out what practical steps you can take to prevent ransomware from gaining a foothold and to detect it when your defenses fail.

07/10/18

Why we need to be worried about deepfake videos

Why we need to be worried about deepfake videos

The potential security threat of realistic fake videos of people doing and saying things they never did is cause for concern. Learn why and how they were developed, the risk they might represent when they spill beyond the world of...

06/25/18

4 reasons blockchain could improve data security

4 reasons blockchain could improve data security

Learn why security experts should be looking at blockchain.

06/05/18

The GDPR is a journey, not a destination

The GDPR is a journey, not a destination

Make sure you understand the need to operationalize data management and security.

05/16/18

The rise of mobile phishing attacks and how to combat them

The rise of mobile phishing attacks and how to combat them

Find out why phishing is starting to focus on mobile devices...and what you can do about it.

04/05/18

Eliminate the IoT security blind spot

Eliminate the IoT security blind spot

Securing the new endpoint: Making the IoT transformation safe for enterprises.

03/13/18

For true cybersecurity you must know what employees are doing

For true cybersecurity you must know what employees are doing

A look at some options for keeping tabs on your staff and the possible pros and cons.

02/28/18

5 tips to help you block ransomware

5 tips to help you block ransomware

Learn about best practices to combat the threat of ransomware.

02/22/18

What does stolen data cost [per second]

What does stolen data cost [per second]

58 data records are stolen every second at an average cost of $141 each.

01/26/18

4 steps to launch a security awareness training program

4 steps to launch a security awareness training program

Policies and software are not enough to secure your data, staff must be regularly trained.

01/10/18

Scan the dark web for threat intelligence

Scan the dark web for threat intelligence

It may be possible to glean valuable security insights by monitoring the dark web.

01/03/18

Application security is maturing, but independent testing is crucial

Application security is maturing, but independent testing is crucial

Skills shortage is making shift to continuous appsec testing challenging.

12/20/17

8 cybersecurity trends to watch for 2018

8 cybersecurity trends to watch for 2018

New challenges and threats will face IT departments in the year ahead.

12/11/17

Can machine learning be used to shore up cyber defenses?

Can machine learning be used to shore up cyber defenses?

Deep learning can be a vital supplementary tool for cybersecurity.

11/27/17

The Darwin defense: can ‘genetic algorithms’ outsmart malware?

The Darwin defense: can ‘genetic algorithms’ outsmart malware?

Coming to a future near you: software code that mutates and evolves.

11/17/17

5 questions to ask your CEO about cybersecurity

5 questions to ask your CEO about cybersecurity

Why you need to go beyond compliance.

10/30/17

Load More