UK drafts Data Protection Bill to stay on par with EU’s GDPR after Brexit

Taking a leaf from the EU’s book on data protection, the United Kingdom is preparing to ...

How security teams commonly sabotage their own efforts

It seems there’s no shortage of enterprises that fall short when it comes to protecting ...

Companies Piling up Bitcoins for Cyber-extortionists - Is this Defeat?

It seems UK businesses are raising a white flag to online extortionists. One in three medium ...

‘Is this data mine?’ How to answer this honest question in data breach verification

Established companies like LinkedIn, Tumblr and MySpace are being run through the mill ...

Cyber insurance market remains fluid

We’ve been writing a lot about cybersecurity insurance - most recently in Cybersecurity ...

The essential value of good threat intelligence

In reaction to the rising complexity and increased damage of certain cyber-attacks, more ...

Building a Culture of Security

Some argue that successful information security is a matter of getting the technology right. ...

Struggling to Control a Burgeoning Number of Endpoints? Consider a Centralized Management Strategy

The definition of corporate “endpoints” is constantly evolving, and securing those endpoints ...

Cybersecurity Insurance: Closing the Widening Risk Gap

It seems no matter how hard enterprises try, no matter what investments in security controls ...

How IoT and Security Play Out in a Businesses Environment

The Internet of Things and quantified-self movements have led to an explosion of interesting ...

How Healthcare Organizations Can Be HIPAA Compliant and Bolster Security in a Virtualized IT Environment

Healthcare institutions remain among the most targeted organizations when it comes to hacker ...

Subscribe to Blog Updates

On-demand Webinar

2023 MITRE Engenuity ATT&CK® Evaluations: Enterprise -Deciphering the Results

WATCH NOW