Category: Security Industry News
-
Guidelines for chief information security officers
Guidelines for chief information security officers> The Indian Express – Pranav Mukul With an aim to spread awareness about the growing cyber threats to the […]
-
Mozilla’s 2018 Internet Health Report Rings Alarm Bells
Mozillaâs 2018 Internet Health Report Rings Alarm Bells> Extreme Tech – Joel Hruska Into this proud moment in history comes Mozilla, with its latest report […]
-
Your Facebook data is only worth $5.20 on the dark web
Your Facebook data is only worth $5.20 on the dark web> Market Watch – Maria Lamagna Thatâs according to a new report from the content […]
-
What makes CISOs successful?
What makes CISOs successful> CSO, from IDG – Jon Oltsik Leadership and communication skills top the list of what’s needed to succeed as a CISO, […]
-
Don’t skimp on IT security training: 27% of employees fall prey to phishing attacks
Don’t skimp on IT security training: 27% of employees fall prey to phishing attacks> Tech Republic – Alison Denisco Rayome ⢠17% of social engineering […]
-
SE Asia businesses at risk of costly cybercrime, studies find
SE Asia businesses at risk of costly cybercrime, studies find> The Nation Cyber crime cost the Asia Pacific region US$171 billion (Bt5.34 trillion) in damages, […]
-
Announcing the Fifth Annual Flare-On Challenge
Announcing the Fifth Annual Flare-On Challenge> FireEye Blog – Nick Harbour The FireEye Labs Advanced Reverse Engineering (FLARE) teamâs annual reverse engineering challenge will start […]
-
7 Elements of a Successful Security Awareness Training Program
7 Elements of a Successful Security Awareness Training Program> Info Sec Institute – Rodika Tollefson Board and C-Suite Buy-In Cross-Department Partnerships Diversity of Tools Key […]
-
RSA Conference: CISOs’ top 4 cybersecurity priorities
RSA Conference: CISOs’ top 4 cybersecurity priorities> CSO, from IDG – Jon Oltsik When cybersecurity executives head to the RSA Conference, they will be looking […]
-
Five Traits to Look for in a Data Protection Officer
Five Traits to Look for in a Data Protection Officer> Information Week – Kon Leong It’s crucial for a data protection officer — required under […]
Categories
- AI / ML
- AIOps
- IT/OT News
- Open Source
- Security Industry News
- Security Strategy News
- SOC News
- Zero Trust
Recent Posts
- North Korean hacker group using false coding tests to spread malware
- OpenBAS: Open-source breach and attack simulation platform
- Introducing Squadcast’s Intelligent Alert Grouping and Snooze Notifications
- Effective Data Security Audit for Big Data Systems – DZone