When it Comes to Cybersecurity, Passive Defense is Best (Undark)

The deluge of cyberattacks sweeping across the world has governments and companies thinking about new ways to protect digital systems. For a long time, cybersecurity experts have e... More

Improving Cybersecurity Means Taking More Care with What We Digitize (HBR)

Security researcher Troy Hunt recently discovered one of the largest online troves of leaked personal information in history. Hunt’s discovery stresses a point that’s been evid... More

Why CISO’s Need to Appreciate the Full Identity Picture in 2019 (Avanade Insights)

Every now and then a new idea gains traction in my industry that demands a little more context. This is the case with a recent security report from Gartner, suggesting the number o... More

Email Security Does Not End With Your Password (We Live Security)

Email is a crucial part of most people’s daily lives, but few people consider how it’s secured, apart from entering a password to access our accounts. What options are availabl... More

Four Cybersecurity Priorities for Congress to Confront Active Threats (The Hill)

The 116th Congress may have difficulty finding common ground on most issues. But there is at least one area that presents the opportunity for bipartisan action: cybersecurity. Cybe... More

SAP’s Tom Padgett, Laura Grant: Agencies Should Pick Cloud Partners Committed to Security, Innovation (GovConWire)

Tom Padgett and Laura Grant of SAP have said agencies should partner with a cloud service provider with a capability to innovate and offer security. Grant and Padgett wrote about t... More

Embrace the Intelligence Cycle to Secure Your Business (Security Intelligence)

Regardless of where we work or what industry we’re in, we all have the same goal: to protect our most valuable assets. The only difference is in what we are trying to protect. Wh... More

Predicting the Future of Next-Gen Access and Zero Trust Security in 2019 (Forbes)

The most valuable catalyst all digital businesses need to continue growing in 2019 is a Zero Trust Security strategy based on Next-Gen Access that scales to protect every access po... More

How Blockchain May Kill the Password (CW)

Blockchain technology is being piloted as the basis for self-sovereign identities, which can eliminate user names and passwords for logging into corporate sites or verify sensitive... More

6 Ways to Anger Attackers on Your Network (Dark Reading)

When you see an attacker on your network, it's understandable to want to give them a taste of their own medicine. But how can you effectively anger intruders when "hacking back" is... More

How Blockchain Is Making Waves In Media, Entertainment (Forbes)

Piracy. A blockchain platform cannot solve the privacy problem just by recording transactions, but it can mitigate piracy if the platform itself delivers the content so streaming t... More

Why Satellites Need Cybersecurity Just Like You (Space)

Any modern person who spends time on the internet is familiar with the basic principles of cybersecurity — but imagine you're in charge of a satellite that people around the glob... More

Machine Learning Will Transform How We Detect Software Vulnerabilities (Security Intelligence)

No one doubts that artificial intelligence (AI) and machine learning will transform cybersecurity. We just don’t know how or when. While the literature generally focuses on the d... More

How to Prepare for the Coming 5G Security Threats (Security Intelligencer)

Over the next few years, the pace of business will accelerate exponentially. 5G will enable the future enterprise technologies everyone is predicting and waiting for: fleets of sel... More

Why Phishing Works: It Exploits Human Gullibility (Avanade Insights)

Phishing has evolved from a scatter-gun approach as a generic email sent to millions of people with the expectation of a low percentage of hits to a targeted campaign designed to e... More

Can We Trust AI-Enabled Machines With Our Cybersecurity? (DXC Technology)

Unless you are coming straight from the dark ages, you cannot escape the deluge of news about the advancement of AI in all spheres of life, be it autonomous vehicles, healthcare or... More

GDPR Six Months On: Is It Working? (Verdict)

Yesterday marked six months since Europe’s General Data Protection Regulation came into force. Since the 25 May, there have been a number of high-profile data breaches that have ... More

Can Advancements in Data Science Address the Challenges to Cybersecurity? (SDC)

The growing complexity in IT networks along with the emergence of technological marvels like IoT, the global connectivity is headed to its peak. The evolution of smart algorithms, ... More

Top 5 Ways to Pick a Secure Password (TechRepublic)

Oh, passwords. Someday somebody will save us from them. Until that heady day, we still need them and we need to choose ones that are really hard to guess. Even if you have two-fact... More

As Mobile Security Challenges Mount, How Can CIOs and CISOs Eliminate Blind Spots? (Security Intelligence)

If we’ve learned anything this year, it’s that mobile malware, malvertising and phishing attacks are growing. Organizations of all sizes and industries are at risk, and IT and ... More