Companies Place Cyber Security in the Spotlight

|
New research shows that cyber security is taking center stage at many organizations. A pessimistic way of looking at this would be to acknowledge that things have gotten so bad with breaches, malware, and other incidents that enterprises have no choice but to focus on security ... Read More

Shades of GDPR: Are You Ready for California’s New Privacy Law?

|
The implementation of the California Consumer Privacy Act of 2018 (CCPA) is just around the corner, but there are indications that many organizations might not be ready for the new data protection requirements ... Read More

Top Inherent Risks with Cloud Security

|
The Cloud Security Alliance (CSA), an organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, recently unveiled its “Top Threats to Cloud Computing: The Egregious Eleven,” a report that examines the risks inherent with cloud security ... Read More

Moving to the Cloud? Be Ready to Embrace Complexity

|
The Cloud Security Alliance (CSA), an organization that works to raise awareness about best practices for secure cloud computing environments, has been especially busy of late—churning out findings related to cyber security and the cloud ... Read More

Grappling with the Security Talent Shortage? Maybe Automation Can Help

|
It’s an issue that gnaws at many cyber security executives perhaps as much as the latest insidious threats: the ongoing security skills shortage. And recent research suggest that the prospects will not get better any time soon ... Read More

New Cyber Security Alliance Aims to Fight Back

|
There’s clearly a sense of combativeness building on the part of cyber security leaders, teams, and organizations worldwide. Weary of seeing cyber criminals and other bad actors break into networks and systems seemingly at will to steal sensitive data, they are taking steps to bolster the overall effectiveness of security ... Read More

Framework Aims to Enhance the Security of Software

|
Software is powering much of the world today, from the largest computing machines to the smallest devices that can fit on a computer chip. That means there is a greater opportunity than ever for security breaches. As any end user knows, even the highest quality software can come with vulnerabilities ... Read More

Strengthen Your Web App Defenses Using Behavioral Analysis and Attacker Deception

For many enterprises today, Web and cloud applications are critical components of the business. And for the ever-increasing number of companies conducting business online, they are the business ... Read More

How to Best Protect Applications in the Cloud

|
Organizations are moving more applications to the cloud as they look to reap benefits such as cost savings, easier scalability, and greater agility. Many of these business applications hold and exchange critical, highly sensitive data, and have therefore become prime targets for hackers and other cyber criminals looking to exploit ... Read More
Loading...