Dropbox Integrates with Google Cloud Identity for Advanced Security Features (ZDNet)

With the new Google Cloud Identity partnership, Dropbox said the goal is to give business users more flexibility to work across devices and platforms while maintaining security. An... More

Wipro Collaborates with Check Point Software to Offer Cloud Security Services (HITS)

Wipro today announced a new partnership with Check Point Software Technologies Ltd, a leading provider of cyber security solutions globally, to deliver Check Point’s advanced and... More

Why Website Maintenance is Essential for Small Businesses’ Cybersecurity (ITProPortal)

Investing time in ongoing website maintenance is a key way to ensure that your small business website is as protected as it can be against cyber-security threats.... More

How to Secure Mobile Messaging in Your Enterprise (Security Intelligence)

If consumers are using these apps to reach out to organizations, you can assume that your employees are doing the same — and likely on your network. If they’re communicating wi... More

CIOs Reveal Their Biggest Fears as IoT Deployment Ramps Up (CBR)

A new IoT survey reveals concerns CIOs have over the uptake and rollout of connected strategies and how they could impact business operations – and ultimately damage revenues. Th... More

Are You Spending Too Much (or Too Little) on Cybersecurity? (DCK)

Figuring out whether a data center is spending enough on cybersecurity is easy in theory but not in practice. First, you determine your appetite for risk. Second, you determine the... More

What Recruiters Need to Know About What Makes Cybersecurity Unique (Forbes)

Cybersecurity is under pressure. There are an increasing number of attacks, an increasing amount of regulation and a predicted skills shortage of 1.8 million workers by 2022. A key... More

5 Ways CISOs Can Improve Collaboration on Security Risks (Security Intelligence)

As operational and security risks converge in the enterprise, the role of the chief information security officer (CISO) is evolving and expanding. Today’s CISO is seated closer t... More

Why You Need Advanced Authentication to Protect Identities Without Compromising User Experience (Security Intelligence)

Gone are the days when a masked robber would walk into a bank, wave a gun in the air and declare, “This is a stick up!” Why would any criminal run the risk of getting caught in... More

Infusing Security Into Digital Engineering (Digitally Cognizant Blog)

The digital economy calls for solutions to be built with digital technologies from the ground up. However, this can result in a double-edged sword: The more a solution relies on di... More

Report: Facebook Shopping Around for a Cybersecurity Firm (TNW)

Facebook’s had a bad year handling user data and securing its systems. Now, according to The Information, the company is looking to acquire a major cybersecurity firm to help rep... More

Is Employee Negligence Threatening Your Information Security? (Security Intelligence)

Between bring-your-own-device (BYOD) policies, shadow IT and an increasingly mobile workforce, companies today are wrapped up in broad potential attack surfaces from employee negli... More

IBM Takes Cybersecurity Training on the Road (NY Times)

Two years ago, IBM opened one of the nation’s first commercial cybersecurity ranges in Cambridge, Mass., to let companies practice responding to simulated cyberattacks. It descri... More

Unfilled Cybersecurity Jobs Reach 2.9M Worldwide (Verdict)

The shortfall is hitting private businesses hard, with 63% of organisations saying they now have a shortage of dedicated cybersecurity staff. The news comes as cybersecurity salari... More

Why Cloud Security is the Top IT Budget Priority for 2019 (TechRepublic)

More than half of companies (54%) share the fear that they may soon outgrow their current security solutions, according to a new report. Shifts in corporate infrastructure will lea... More

The App Explosion and Digital Transformation Drive Rapid Growth of the Identity Management Market (DXC Technology)

The identity management market is growing much faster than the overall IT market, and for good reason. While the enterprise IT market is expected to grow by 3.5 percent through 201... More

How Do Cyber Criminals Hack Small Business Startups? Here’s What We Learned from Microsoft (USA Today)

There are all sorts of ways the bad guys can get log-in credentials and other critical data from your business — they can send you a fake phishing email that looks totally legit ... More

The Future of the Fintech Will Require Security, Not Just Innovation (IT Pro Portal)

For IT leaders the cloud is crucial as it supports the rapid, continuous development of application-based services, enabling firms to react quickly to market demand with innovative... More

Irdeto Opens Pontiac Office (CDB)

Irdeto has signed a three-year lease to take up 2,500 square feet in the Riker Building in Pontiac, MI. The company celebrated the opening of the new office Wednesday afternoon. Wi... More

As IoT Security Concerns Rise, are Solutions Keeping Up? (Security Intelligence)

Many objects nowadays can be turned into internet-connected devices, and any one of them can make its way into the workplace. In fact, Gartner expects more than 65 percent of enter... More