Cloud Security Rises to Top of 2019 Cybersecurity Budget Priorities

|
As enterprises look toward the 2019 budget cycle, CISOs and other IT executives are increasingly pushing cloud security to the top of the cybersecurity budgetary priority list ... Read More

2018 State of DevOps: Great for Security

|
The annual State of DevOps report is out for 2018 and the study offered up some very strong proof points for the tight relationship between mature DevOps practices and improved security operations ... Read More

Seven Signs of a Strong Security Culture

|
The importance of a strong enterprise cybersecurity culture to the overall effectiveness of an IT security department can't be understated. It's consistently named by executives as a crucial, if ephemeral, ingredient for cyber risk management success ... Read More

5 DevOps Trends CISOs Must Watch

|
Make no mistake, DevOps trends are catching fire in the enterprise these days and for good reason. A new report out by DevOps Research & Assessment (DORA) shows that the highest performing DevOps organizations are crushing their software delivery metrics ... Read More

Four Cool Tools Expected Out of Black Hat

|
Security professionals, penetration testers and malware investigators are preparing to get energized. In just about a week the hacking community will converge on Las Vegas to drop their biggest discoveries of the year at the podiums of Black Hat USA. This annual confab always offers up a range of great ... Read More
Dell Sky Global BGP hijacking

Virtualization Flaw Uptick: It’s ‘Just Getting Underway’

Virtualization vulnerabilities are seeing a huge surge this year as security researchers start to truly take the microscope to the full range of virtualization software. Hypervisors increasingly are being used against every level of the enterprise hardware stack—servers, desktops, storage, network equipment and more—and virtualization is what’s powering the cloud ... Read More
Security Boulevard

5 Cryptojacking Consequences CISOs Can’t Ignore

|
The rising tide of criminal schemes to steal compute cycles for mining cryptocurrency has reached a high-water mark. This month researchers report that cryptojacking malware and attacks have overtaken ransomware as the number one malware threat online today ... Read More

Five Reasons Enterprises Aren’t Getting the Most Out of Security Automation

|
Automation is enterprise cybersecurity's biggest buzzword as organizations seek to keep pace with a threat landscape that grows more frenetic by the hour. But as automation spending skyrockets, many enterprises are finding that they're not getting the most out of their investment ... Read More

Tesla Sabotage Highlights Danger of Insider Threat

|
Electric car manufacturer Tesla is facing a nightmare insider attack scenario for which too many companies today fail to prepare. Tesla CEO Elon Musk admitted this week that an employee managed to intentionally wreak havoc with the software code that underpins the company's manufacturing system. The fallout has resulted in ... Read More

Three Ways DevOps Teams Can Step Up GitHub Security

Last week the team behind Git, a platform that powers millions of the world's developer code repositories--including those on the wildly popular GitHub hosted service--released a crucial security update meant to keep developer environments safe. The patch was made to fix a flaw in how Git handles submodule repository configuration ... Read More