The formation of a professional body to provide standards of excellence within cybersecurity practitioners has been mooted for many years. Now the UK government...
Hi, what are you looking for?
The formation of a professional body to provide standards of excellence within cybersecurity practitioners has been mooted for many years. Now the UK government...
Theory Suggests we Need to Come to the Very Brink of Cyberwar Before Humanity Backs Down and Finds a Solution
New research confirms and quantifies two known challenges for security operations teams: they don't have enough staff and would benefit from automated tools.
Aligning security policy with business practices is generally considered to be a key imperative for a successful company. This must necessarily start with security...
A new campaign by the Russia-based Cobalt hacking group was observed on August 13, 2018. Cobalt is best-known for targeting financial institutions, and this...
For many months it was expected that privacy protections afforded to consumers by GDPR would also benefit the bad guys.
Mountain View, Calif-based Lacework has closed a $24 million Series B funding round with Sutter Hill Ventures, bringing the total raised, including Series A...
The latest ESRA report from Mimecast indicates just why email attacks are so loved by cybercriminals, and why organizations need to take email security...
Medical infusion pumps, which deliver medications to patients, are archetypal examples of the expanding threat surface being delivered by connected devices. Connecting these pumps...
Every day, cyber threat intelligence firm RiskIQ hoovers up terabytes of internet data. It concentrates on the internet infrastructure and how it functions, gathering...
Despite government demands for backdoors into end-to-end encryption, it remains a legitimate requirement for business. Political tensions affect, but don't stop, international commerce; and...
The Use of DMARC is Growing -- But it is Difficult to Configure Correctly and Completely