Take a Proactive Approach to the Darknet Threat (Security Intelligence)

Over the last few years, there has been a 20 percent increase of threat actors on the darknet selling tools, services and stolen data to target the world’s most prominent organiz... More

Software Developers Face Secure Coding Challenges (IW)

More organizations are adopting agile programming practices and secure development lifecycles, but most fail to provide developers the tools and processes they need to produce secu... More

Instant Messaging Platforms are Here to Stay But are They Secure Enough? (IA)

Instant messaging platforms have revolutionized the way we communicate but they've introduced new security challenges.... More

Emerging Digital Technology Means Emerging Job Opportunities for Cybersecurity Pros (DXC Technology Blog)

Every technology must be managed and secured to prevent its misuse. As digital technologies become even more complex and interconnected, they create an ever-proliferating number of... More

4 Social Engineering Threats to Keep an Eye on – And How to Stop Them (Security Intelligence)

Socially enterprising threat actors are getting bored with the low success rates of mass phishing campaigns and turning toward more advanced tricks. If there is any guarantee about... More

Pulling Strategic Value Out of Your Cyberthreat Intelligence Practices (Security Intelligence)

An increasing number of companies today depend on their cyberthreat intelligence practices to stay ahead of determined attackers and an ever-expanding attack surface. In fact, 72 p... More

Alphabet’s Cybersecurity Company Chronicle is Merging Into Google’s Cloud Business (CNBC)

Alphabet will fold its enterprise security company Chronicle into Google Cloud later this year. Chronicle originally spun out of X, the company’s experimental projects lab, and s... More

DXC Technology, Zafin Partner to Help Banks Manage Conduct Risk, Increase Customer Lifetime Value (HITS)

DXC Technology and Zafin have entered into a collaboration that will enable DXC’s core banking clients to make a strategic response to the changing demands of the marketplace. A ... More

What is Threat Modeling and How Does It Impact Application Security? (Security Intelligence)

Throughout my career in software development and application security, I have worked on many development and operations teams and have often seen issues when it comes to implementi... More

Forget About The Terminator – We Should be Worrying About AI Malware First (Verdict)

The advancement of artificial intelligence prompts fears of a Terminator-style future where humans live as an underclass to the machines we created. However, humanity may face a fa... More

Amazon Web Services Rolls Out Control Tower, Security Hub (GeekWire)

After seven months in preview, Amazon Web Services on Monday night announced the general availability of AWS Control Tower and AWS Security Hub, aiming to make it easier for corpor... More

Machine Learning Helping to Stop Security Breaches With Threat Analytics (Forbes)

Machine learning is enabling threat analytics to deliver greater precision regarding the risk context of privileged users’ behavior, creating notifications of risky activity in r... More

Why Cloud Should Be Part of Your Disaster Recovery Strategy (IT Pro)

With cyber attacks frequently making headlines, and the General Data Protection Regulation (GDPR) coming into force last year leading organisations to look closer at how they secur... More

The Serverless Security Shift (Network Computing)

Security in the cloud has always followed a shared responsibility model. What the provider manages, the provider secures. What the customer deploys, the customer secures. Generally... More

5 Reasons to Simplify Your Security Landscape Today (Avanade Insights)

Keeping things simple is increasingly one of the most important – and challenging – initiatives for today’s security leaders. As outlined in our latest guide for CISOs, IT is... More

Global Enterprise Security Spending to Hit $103B This Year (DXC Technology Blog)

The pace of enterprise information security spending on hardware, software, and services is expected to grow 9.4 percent this year over 2017, according to a recently released forec... More

Akamai Extends Security Services to the Enterprise (Security Boulevard)

Akamai extended the reach of its managed security services beyond websites to include applications running in on-premises IT environments and in the cloud. Lorenz Jakober, director... More

Stepping Into the Cloud Requires New IT Security Tactics (IW)

As organizations chase advantages made possible through cloud transformation, it is possible they might tread in spaces their security protocols are not prepared for. Many executiv... More

As GDPR Turns One Is It a Success or a Failure? (Forbes)

As the European Union’s much discussed General Data Protection Regulation (GDPR) turns one later this month, what has its legacy been and has it overall been successful in its at... More

Hackers are Becoming Sector Savvy: Here’s How to Keep Up With Their Changing Tactics (Forbes)

As an example of how sophisticated hackers are becoming, new incidents may be indicative of a larger move away from mass-issued ransomware or phishing attacks, toward more targeted... More