George V. Hulme

The rising security risk of the citizen developer

What makes a good application pen test? Metrics

What makes a good application pen test? Metrics

Research from application security crowd testing and bug bounty program provider Cobalt attempts to define what enterprises could measure to improve results

7 verontrustende TED Talks over security

Van Bruce Schneider, Twitter en meer,.

Tackling cybersecurity threat information sharing challenges

Tackling cybersecurity threat information sharing challenges

What are the lessons learned and recommended practices for forming new information sharing organizations? That’s where the newly formed International Association of Certified ISAOs (IACI) comes in. IACI CEO Michael Echols explains.

Enterprises continue to struggle to find cybersecurity talent, survey finds

Enterprises continue to struggle to find cybersecurity talent, survey finds

More enterprises continue to turn to managed security services providers to close the gap

Business transformation proves to be a catalyst for cybersecurity spending

Business transformation proves to be a catalyst for cybersecurity spending

Evolving risks and business technologies shift focus in security budgets

9 gevaarlijke denkfouten in IT-security

Je zit vol met verkeerde aannames

So you want to be a security researcher?

So you want to be a security researcher?

Ever consider conducting your own security research but didn’t know where to start? DataGravity CISO Andrew Hay has some advice for you.

CSO Threat Intelligence Survival Guide

If enterprises want to understand how they can better invest in security defenses, build the necessary processes to respond to attacks, and mitigate the risks of a breach they need to get threat intelligence right.

Securing mobile health records remains a significant challenge

Securing mobile health records remains a significant challenge

Healthcare organizations are investing big into mobile medical records, but are they keeping them secure?

Mobile security Q&A: Securing the mobile minimum viable app

Mobile security Q&A: Securing the mobile minimum viable app

As enterprises struggle to keep up with their internal demand for mobile apps, more are turning to more rapid development workflows. What does this mean for app security?

The CSO IoT Survival Guide

The CSO IoT Survival Guide

As the world of the connected everything approaches, CISOs need to know how to keep all of their enterprise IoT devices, as well as the data they generate, secure

Load More