• img May 16, 2018

Are security pros happy with their jobs and salaries?

Do security professionals like their jobs and would they recommend a career in cyber security to those looking into one? What do they like about their jobs and what motivates them in their work? Are they satisfied with their pay? What emerging technologies are they most excited about, and do they feel threatened by the […]

Read More
  • img May 16, 2018

White House eliminates Cybersecurity Coordinator role

The White House has eliminated the role of Cybersecurity Coordinator, generally viewed as the top cybersecurity role in the US government. The decision was made by John Bolton, the most recent National Security Advisor of the United States, after both Tom Bossert, the homeland security adviser to the president and cybersecurity czar, resigned in early […]

Read More
  • img May 16, 2018

Companies ditch data as GDPR deadline approaches

A new study from IBM reveals that nearly 60 percent of organizations surveyed are embracing the GDPR as an opportunity to improve privacy, security, data management or as catalyst for new business models, rather than simply a compliance issue or impediment. Preparations for GDPR To reduce their exposure, the study indicated that the majority of […]

Read More
  • img May 16, 2018

Threat analytics: Keeping companies ahead of emerging application threats

Every application that is downloaded via an app store runs in a zero-trust environment. When a protected app is published to an official app store, an open loop of protection is created, leaving the app without a way of communicating its current threat status. With more than 5 million apps available for download, this opens […]

Read More
  • img May 16, 2018

25% of companies affected by cloud cryptojacking

Cryptojacking has unquestionably gone mainstream. Despite heavy media and industry attention, organizations are struggling to meet compliance requirements in public cloud environments, according to RedLock. On the flip side, there’s evidence that companies are becoming more aware of cloud account compromises and implementing best practices to prevent attacks, but there’s still no shortage of new […]

Read More