How to Secure a Premier League Football Team (Forbes)

Arsenal is preparing to play Everton in the Premier League this Sunday. Led by manager Unai Emery, the team will currently be researching its opposition and formulating a game plan... More

What Is Shadow IT and Why Should You Care? (TechHQ)

The most prevalent form of Shadow IT refers to cloud services, especially software as a service. As valuable as distributed data storage has become, the rise of the cloud has fuele... More

Google: It Takes Two to Tango if you Want Cloud Security (CBR)

Google Cloud has published new guidance on data incident response and security for its users, noting that while it employs advanced detection tools and alert mechanisms that provid... More

Proving the ROI of a Sound Security Strategy (IM)

It’s up to security leaders to speak to senior leaders in a language they will understand, inciting them to mobilize. They reinforce that security must be built into the products... More

Why Every Enterprise Needs a Hackathon (Tech HQ)

When you typically think of a group of coders, sitting in a room, hacking away at a problem. Some call it a team-building exercise and some call it ‘active innovation’, but wha... More

IBM Security CTO on the Changing Shape of Innovation (Information Age)

According to Sridhar Muppidi, the CTO’s role has fundamentally evolved from being purely responsible for the technology in an organisation to a position that is responsible for a... More

Crowdsourcing the Hunt for Software Bugs is a Booming Business – and a Risky One (MIT Tech Review)

More and more large companies like GM, Microsoft, and Starbucks, are now running “bug bounty” programs that offer monetary rewards to those who spot and report bugs in their so... More

Google Titan Security Key Kit Now on Sale for $50 (PC Mag)

Titan Security Keys look and function like any other security keys on the market, so don't expect anything game-changing. But Google's keys can help you protect your Google, Facebo... More

Can Supercomputers Improve Cybersecurity? Not for a While (DCK)

Supercomputers are evolving at a maddening pace, but no matter how powerful, they remain impractical for solving security challenges.... More

Automation Becoming the New Norm for Cybersecurity (IT Pro)

A new global survey has revealed that while companies are using more automation in cybersecurity, they still have a great deal more to do as AI and machine learning are still in th... More

Google Cloud Designs Hardware Module for Encryption, Offers It as a Managed Service (DCK)

Google Cloud Platform made three additions to its encryption offerings; It's added a managed cloud-hosted hardware security module service, support for asymmetric keys for use with... More

Information Security Spending to Surge to Over $124B by 2019 (CBR)

Global spending is expected to surge to over $124 billion by the end of 2019, according to Gartner. Data breaches and security incidents can be costly to the enterprise, resulting ... More

How AI, IoT, Big Data Will Shape the Future of Cybersecurity (TechRepublic)

Caleb Barlow, IBM Security Vice President: "An average security operations center at a mid-sized company receives about 200,000 security events a day. Now, that's everything from S... More

Facebook Issues $1M in Cyber-Security Defense Awards (eWeek)

A year ago, Facebook Chief Security Officer Alex Stamos pledged that the social media giant would issue $1 million in grants to help fund and support internet defense efforts and r... More

Could AI be the ‘Silver Bullet’ to Cybersecurity? (IT Pro Portal)

New research from the cybersecurity firm ESET has revealed that the recent hype surrounding AI and machine learning has deceived three in four (74%) IT decision makers into believi... More

Will Quantum Computing Destroy Blockchain? (MarkLogic Blog)

Blockchain and quantum computing are two major trends that are rapidly moving forward in technology today. Both offer major potential advancements, but when they come into conflict... More

How AWS IoT Device Defender Secures Connected Devices (Forbes)

AWS IoT Device Defender is a fully managed IoT security service that enables customers to secure their IoT configurations on an ongoing basis. With AWS IoT Device Defender, custome... More

AWS Elemental, Friend MTS Partner for Video Security (BTN)

Friend MTS has announced interoperability with its Distribution iD watermarking and Amazon Web Services (AWS) Elemental MediaConvert. The invisible, distributor-level watermarking,... More

NSS Labs Announces Industry’s First SD-WAN Group Test Results (HITS)

NSS Labs announced the results of the industry’s first Software Defined-Wide Area Network (SD-WAN) Group Test. In this groundbreaking, inaugural test, nine of the industry’s le... More

PGA Stuck in a Bunker After Ransomware Tees Off on Its Computer Network (SiliconAngle)

The Professional Golfers Association of America is the latest victim of ransomware, which has crippled the organization’s computer network ahead of its PGA Championship event at ... More