With roughly one month to go before the May 25 enforcement date, what do organizations still misunderstand about the EU's General Data Protection Regulation? John McLeod of AlienVault shares his insights on GDPR.
Industrial control system environments are tough to hack, because each is unique, says Sergio Caltagirone of Dragos. But the recent emergency of Triton malware shows that attackers have been testing how to compromise some environments, which could have catastrophic results.
Banks and other financial services sector organizations need to pay more attention to their security infrastructure and defenses and apply application security safeguards to monitor all of their data - as well as individual files, says Terry Ray, CTO of Imperva.
The managed security services marketplace has matured, says Rick Miller of Trustwave. But persistent myths continue to color perceptions. Miller attempts to shatter those myths and shed light on the market's new realities.
You know that you've got a problem to solve but how will you address it? More importantly, who will help you address it? This is the crux of the build versus buy debate that companies are currently having with themselves.
While building and buying both have their merits, they also have costs which should be...
Mexico's central bank says attackers attempted to hack its interbank electronic transfer system, but says no client money was lost. It's activated "contingency measures" at the targeted banks and says payment transfers could slow as a result.
Twitter is now caught up in the Cambridge Analytica scandal: The social network sold public Twitter data to Aleksandr Kogan, the same person who sold Facebook data to Cambridge Analytica. Twitter says Kogan obtained no private information on users.
As director of the NSA for nearly a decade, Gen. Keith Alexander (retired) saw the nation-state cybersecurity threat evolve from a nuisance to a sophisticated adversary. Now, as CEO of IronNet Cybersecurity, he's spearheading a defense.
As the head of DevSecOps at Intuit, Shannon Lietz tracks the real-world tactics, techniques and procedures hackers use against her organization. She's cataloged the top 10 application security attack techniques being used against Intuit, which differ markedly from the OWASP top 10.
Hacking is a global phenomenon, says Liv Rowley, an intelligence analyst at Flashpoint who's been tracking the rise, fall and mysterious reappearance of Cebolla Chan 3.0, the Latin American region's top Spanish language hacking forum.