Slack Moves to Integrate with EMM for Enterprise Security (Computerworld)

Slack has enabled integration with more than a dozen enterprise mobility management (EMM) platforms in order to offer security and policy management features to its four-year old, ... More

Irdeto Report: Majority of Consumers Believe IoT Needs Security Built In (Dark Reading)

While 90% of consumers across six different countries expect security to be built into their Internet of Things devices, the question about who should be responsible for implementi... More

Five Reasons Why Business, IT Leaders Should be Looking at Dynamic Cybersecurity (HCL Blog)

While cybersecurity has consistently been ranked as a top investment priority for enterprises, one can argue that it has never been more critical for ensuring business success, tha... More

Kroll Names Pierson Clair Senior Director in Cyber Security and Investigations Practice, Los Angeles (CDSA)

Kroll announced the appointment of Pierson Clair as a Senior Director in Kroll’s Cyber Security and Investigations practice. He is based in Kroll’s Los Angeles office. “P... More

CIOs Should Step Into the IoT Oversight Void (CIO)

If you think your organization is taking oversight of third-party IoT implementations seriously, think again. According to a recent study, few organizational boards require IoT ris... More

IBM Opens European X-Force Command Center in Poland (HITS)

IBM Security today announced the official opening of its modernized European IBM X-Force Command Center based in Poland. The center has new cognitive capabilities, including IBM Wa... More

Key Challenges Companies Face with Big Data Security (SDC)

Big data security seems to gain more attention with each passing year. In fact, the World Quality Report of 2015-2016 claims that security is the number one priority, and concern, ... More

Protecting Your Organization from Ransomware (Avanade Insights)

Ransomware has been making big news in the last week. The cruel reality of the global ransomware attack that crippled computer systems in 150 countries is that the attackers took ... More

Trump Signs Long-Delayed Executive Order on Cybersecurity (TechCrunch)

President Trump signed a executive order today commanding a review of the United States’ cybersecurity capabilities. Trump was initially set to sign the order shortly after his i... More

Time to Cast a Spotlight on Shadow IT (Avanade Insights)

The debate rages on the increase in Shadow IT – being IT services procured by the line of business directly from the as-a-service provider. I would suggest that the main concern ... More

6 Signs Enterprise Security is Getting Better (InfoWorld)

Identity is becoming the security boundary - For decades, the security boundary was the network perimeter or firewall. Then it morphed to each individual computing device or host. ... More

Report: Young Adults Drawn to Life of Cyber Crime (PCMag)

Technologically-savvy young adults are drawn to hacking by the perceived glories of cybercrime, according to a new report from the UK's National Crime Agency. Based on discussio... More

Majority of People are Still Confused About Cybersecurity (ARC)

Pop quiz! Do you know what a botnet is? Can you spot a “phishing” attack? Is there a difference between a URL that begins with https:// as opposed to http://? Can Internet Serv... More

NSS Labs Announces Web Application Firewall Group Test Results (HITS)

NSS Labs today announced the results of its second Web Application Firewall (WAF) Group Test. A growing segment of the security market, WAFs employ a wide range of functions to wor... More

How to Build Systems that are Resilient Against Attack (Independent Security Evaluators Blog)

It is almost a daily occurrence in today’s society to read a news story about a major company or government entity becoming the next victim of a cyber attack. The security indust... More

When You Move to the Cloud, Don’t Fall Asleep on Cybersecurity: A 6-Part Checklist from IBM (TechRepublic)

After years of enterprises fearing the cloud because of security, we're now at risk for the opposite problem—companies relying too heavily on their cloud providers to look after ... More

Yahoo Breach Lessons IT Can’t Ignore (InfoWorld)

As more details emerge about how a group of four Russians breached Yahoo, it's increasingly clear that the Internet's very interconnectedness is what makes us so vulnerable to onli... More

Cybersecurity Must Go Beyond Passwords (ET)

If indeed we are operating in a "digital economy," standard security measures such as passwords are no longer sufficient to shield the underlying IT infrastructure from sophisticat... More

How to Drive Productivity Without Compromising Cybersecurity (Forbes)

Cybersecurity is one of the fastest-growing industries, and it’s easy to see why when you recognize the current value of information. IT security spending eclipsed $75 billion in... More

Workplace Wearables Raise New Privacy Dilemmas for Staff, Firms (ReadWrite)

With the proliferation of wearable technology, companies are increasingly finding motivation to encourage staff to don connected devices. But on IDG’s CIO site tech writer Gary E... More