Our most recent articles, videos and interviews relevant to anyone working within Information Security.

Mobile security Increasing security risks in the age of applications

Lori MacVittie, Principal Threat Evangelist, F5 Networks, discusses why, despite education and a constant litany of reminders that security is …

Passwords Active Directory self-service password reset from Specops

The problem Resetting users’ corporate passwords is a common support case for the IT helpdesk, especially when the requirements are …

Cyber security Are you using DMARC? If not, why not?

Why aren’t more companies using DMARC? Watch this Security Leaders' Roundtable where Quentyn Taylor, Director of Information Security at Canon …

Malware Why NotPetya was a really good piece of malware

What made NotPetya a really good piece of malware? Watch this Security Leaders' Roundtable where Quentyn Taylor, Director of Information …

Supply chain How to deal with the complexity of supply chains

How can we deal with the complexity of supply chains? Watch this Security Leaders' Roundtable where Quentyn Taylor, Director of …

Cloud security 2020 cybersecurity trends and resolutions

Ray Pompon, Principal Threat Research Evangelist, F5 Labs, shares insight on 2020 cyber security trends and resolutions From tech giants …

Technology Is the open-source technology Zeek, one of the most trusted but underappreciated tools in...

Is the open-source technology Zeek, one of the most trusted but underappreciated tools in security? Gregory Bell, CEO at Corelight, …

Fake news Is fake news a cyber security challenge?

Is fake news a cyber security issue? Should cyber security professionals be held responsible for stopping the spread of misinformation? …

Cyber security Hackers have first-move advantage – that’s why defenders should learn like they do

If threat actors didn’t innovate, we would have already won. It’s their ability to imagine new ways to hurt us, …

Ransomware Ransomware is back with a vengeance – how should enterprises respond?

Shawn Kanady, Director of Digital Forensics & Incident Response at SpiderLabs, Trustwave, draws on his first-hand experience of dealing with …

Data protection GDPR vs CCPA: Two legislations, different requirements

W. Curtis Preston, Chief Technical Evangelist, Druva, discusses America’s version of GDPR, the California Consumer Protection Act (CCPA), and what this …

Fraud The Grinch bot that stole Christmas

Edward Roberts, Director of Product Marketing at Imperva, explores the strain that holiday bots are having on retailers and the …