Data protection What can we learn from the state of vulnerabilities in 2019?

Dima Bekerman and Sarit Yerushalmi, Security Research Managers at Imperva, reflect on the changes and trends in web application and database …

Cloud Migrating to the cloud? Essentials you need to know

Juan Perez-Etchegoyen, CTO at Onapsis, imparts his years of experience working with the cloud in order to provide a blueprint …

Business Continuity Business continuity strategy planning: Mistakes to avoid in 2020

Gary Criddle, Principal Cyber Risk and Resilience Consultant, Sungard AS, shares 6 business continuity strategy planning mistakes to avoid. Any …

Cyber security 5 steps to bolstering cyber security defences in the face an ever-growing threat

How to prevent data breach hell? Craig Hinkley, CEO of Whitehat Security, has the answers. A data breach of any …

Cyber skills How to write a winning CV for a job in cyber security

Moreno Carullo, co-founder and CTO, Nozomi Networks, discusses what budding cyber security professionals need to include in their CV to …

Fraud How to overcome the Magecart threat in 2020 and beyond

Simon Roe, product manager at Outpost24, outlines the dangers of Magecart over the coming years. The criminal group Magecart has …

Training Five tips to help companies develop and maintain a culture of security awareness

In this opinion piece, Gerald Beuchelt, CISO of LogMeIn, considers how companies can develop and maintain a culture of security …

IoT Why smart cities should be cyber security cities 

In this article, Galina Antova, co-founder and chief business development officer of Claroty ,talks about OT security in smart cities and …

Mobile security Jeff Bezos phone hack: Are we optimistically biased towards mobile devices?

Jeff Bezos's phone was hacked; what does this say about the relationships we have with our phones? Roy Akerman, VP, …

Hacking The cyber criminals selling network access to the highest bidder

Levi Gundert, SVP of Global Intelligence at Recorded Future , discusses the selling of pay-per-install services on the dark web, …

Data privacy Tips for remaining secure this Data Privacy Day

The fact that Data Privacy Day is being celebrated for the entire month of January rather than just one day …

Data protection Proactivity is key this Data Protection Day 

The data breaches and hacks populating the news each week make it increasingly difficult to ignore issues regarding data protection. …