Have any network logins? Go Phish
Training your employees to recognize a social engineering attack is the best way to defend against phishing, experts say. How else can you defend yourself? We provide some suggestions.
AI: Utopia or dystopia?
Today AI is being used to find vulnerabilities in software and systems before the attackers do so, enabling defenders to be proactive in finding zero days and potential Patient 0 victims. We explain how this works.
Beware the Insidious IoT Devices
As security professionals determine how to protect IoT devices, end users still add more vulnerable devices to their networks. When do you draw the line? Listen to some security execs who have and are facing just that decision.
Romancing the Blarney Stone
As identity and access management becomes more sophisticated, companies need to ensure they have both the technology and the staff to make them work. If not, the technologies become solutions without a problem. So what’s next?
Bits in a Box: Containers, a UNIX one-trick pony, make a comeback
The container-vs-virtual machine debate confirms one important sea change for security professionals: containers are back from their UNIX heyday, bringing speed and scalability to cloud-based applications and development.
GDPR: Resistance is Futile
GDPR will be here soon whether you're ready or not. Non-compliance fines can be massive. Is your GDPR strategy going to pass muster with regulators and auditors? We explore the possibilities, arguments and practical approaches.