Enterprise | News, how-tos, features, reviews, and videos

steal theft hacker crime laptop firewall
bitcoin security vault

10 insurance

Cyber insurance: data breach, business interruption and beyond

Every business, especially small and medium-sized companies, should have cyber liability insurance—here are the reasons why.

location symantec headquarters exterior 300dpi

Symantec: Diverse threats remain a consistent problem online

A report published this evening by Symantec outlines the rocky year consumers and business owners had online in 2017, covering everything from coin mining attacks, problems in the supply chain, ransomware, BEC attacks, and more.

security network virtual display

3 areas in which CISOs are becoming more proactive

Security executives are taking a hands-on approach in areas such as threat intelligence, privacy, and business initiatives.

cybersecurity stock

Who's who in the cybersecurity market? The inside scoop for 2018

Big tech will go big on cybersecurity in 2018. Expect Amazon, Google, Microsoft and others to get tough on cyber crime.

intel cybersecurity bg 1920

Approaching cybersecurity as a critical business function

Taking the right security steps for small and medium-sized businesses (SMBs).

financial tech fintech money binary

Cybersecurity market slowdown? Not anytime soon

Despite some analyst speculations to the contrary, cybersecurity spending is rising sharply.

Internet of think with padlock showing security

Cyber attack surface facts, figures and statistics for 2017 to 2022

We're seeing a massive expansion of internet-connected people, places and things — and securing all of them is a problem.

hand holding paper cloud for amazon web services logo

AWS pushes into the trillion-dollar cybersecurity market

Amazon Web Services (AWS) enters the cybersecurity market with the debut of its Amazon GuardDuty service.


5 actions that companies should take to establish their first cybersecurity program

A mature enough company must start laying the foundation for their enterprise security program.

padlock with circuitry lock in secure

Protecting business assets

Identifying business assets and connecting your security program to them.

Gmail Google Mail

Businesses switch to Gmail for ransomware and spear-phishing protection

Gmail's built-in phishing detection and ransomware defense lures business users to switch email platforms.

business merger

Largest cybersecurity M&A deals in 2017

A look at noteworthy cybersecurity-related mergers and acquisitions with publicly disclosed financials this year.

financial tech

Largest cybersecurity venture capital deals in 2017

A look at venture capitalist firms that have invested $40 million or more into cybersecurity startups this year.

confused marketing guy

The secret to motivating leadership about digital risk? There is no digital risk

Although your senior executive leaders are aware of digital and cyber risks, it often gets lost in their risk prioitization. Shifts in public and regulatory focus are changing digital risk management responsibility, but losses keep...

Equifax Security Breach CEO Richard Smith

In Equifax data breach, three hard lessons in risk

How much security risk can an organization accept before it’s on very thin ice? The equation is simple: decide how much money it will take to reduce the risk, and how much more money an organization will earn by accepting that...

Man in suit signing contract planning strategizing

6 tips for drafting better statements of work

You can draft the most protective contract in the world, but if the statement of work (SOW) fails to adequately describe the deliverables, projects can fail.

Load More