Technology Industry

Technology Industry news, information, and how-to advice

computer forensics

4 reasons forensics will remain a pillar of cybersecurity

When protection fails, forensics can still prevail.

hearts

7 ways to stay safe online on Valentine’s Day

Looking for love in all the wrong places? Here are some helpful tips for safeguarding yourself while trying to find love on the internet.

businessmen with umbrellas risk protected storm

How do I BRI?

Regardless of the threats, risks and security challenges a business may face, it’s crucial to recognize that having the right approach to intelligence has truly become a requirement.

vulnerable security breach innocent attacked

The global ungoverned area

Looking at the Internet through Westphalian-tinted glasses is not going to make us safer or more secure.

alert hacking threat detected

How to automate threat hunting

The quest for hidden threats...

steal theft hacker crime laptop firewall

Who Is watching the watchers?

The Kaseya event should serve as a wake-up call for companies that fail to scrutinize the security standards of their vendors—including their security vendors!

data search money currency solution uncertainty escape leave

If time is money, what exactly is data?

If you consider how much your data is worth to various parties and in varied contexts, then you’ll be in a better position to understand both its value and the extent to which it needs to be protected.

cool cat with sunglasses independent

3 reasons why security automation is as cool as blockchain

When security teams take advantage of automation, they can rapidly triage alerts, investigate incidents, contain threats, and protect their companies and customers faster than ever before.

email iot internet security

The life and death of a document: where did it really go?

As the Moody Blues would say, what became of that letter you never meant to send?

businessman looking through binoculars future vision prediction

The future: it ain’t what it used to be

The problem with the future—as baseball legend Yogi Berra, the founders of the internet and any CISO or CTO can assure you—is that, increasingly, it ain’t what it used to be.

network security primary2

Why it’s harder for threats to hide behavior on a corporate network

If signatures in cybersecurity are like fingerprints in a criminal investigation, behavioral detection is like profiling – it’s harder to hide, but it’s not foolproof either.

nup 177120 0001

How the International Olympic Committee can win gold in cybersecurity

While hackers like “Fancy Bears” may continue their mission to create headline-grabbing attacks and disruptive behavior, there are steps every institution across the world and in varying industries can take so they don’t fall victim. ...

man asleep at desk

Becoming vulnerability agnostic

Don't let the constant barrage of vulnerability announcements play with your emotions and drive up your stress levels.

calculator numbers math accounting

Yes, fraud affects your bottom line

It also impacts conversion, customer experience and customer retention.

win compet chess challenge strategy plan

Strategic security

Do you really want to keep solving the same security problems forever?

1a bullet

Mandatory Breach Notification is not a silver bullet

Global experience demonstrates that a Notifiable Data Breach (NDB) regime does little to make organizations act to ensure ongoing information security. And with generous exemptions provided by the Australian NDB rules, data breaches,...

porting converting magic change

Understanding Gartner, and its limitations

Using a Gartner MQ is a great way to get an initial list of some of the products in the particular space. But it is not the definitive list by any stretch of the imagination.

protection privacy security internet network lock

3 ways to make the most of GDPR

EU regulations provide an unprecedented opportunity to elevate cybersecurity as a business enabler.

vulnerable gdpr breach security cyber attack

GDPR keeping you up? There’s another monster hiding under the bed…

There’s another deadline in May that needs to be paid attention to – the NIS Directive.

hipaa compliance 1

Is your cloud service provider ready for HIPAA?

Is your industry’s compliance with the Health Insurance Portability and Accountability Act of 1996 covered in the cloud?

Load More