Read more about tips
Bookmark and Share
  • Five key security, identity and access management trends

    15.01.2015

    CA Technologies announced five key trends for security and identity and access management (IAM) that will impact organizations and security professionals in 2015 as they compete in the application economy.

  • Cost of breach vs. cost of deployment

    14.01.2015

    Security breaches are happening on a daily basis, with millions of usernames, passwords, and associated personally identifiable information being harvested.

  • Donít look back in anger

    13.01.2015

    At the end of the 2014, as at the end of many years before it, our mailboxes were filled with various vendors' security predictions for 2015.

  • Identity management trends in 2015

    13.01.2015

    A new year is always an excellent time to look ahead.

  • Do we need regular IT security fire drills?

    12.01.2015

    IT security Ďfire drillsí, supported by executive management and the risk committee should be conducted regularly in organizations, in order to understand the appropriate course of action in advance of a security breach.




Spotlight

Infosec management strategies and the modern CTO

Posted on 21 January 2015.  |  Brandon Hoffman, Lumeta's CTO, talks about the management strategies that are essential in the information security industry. He also offers advice to those stepping into the CTO role for the first time, and talks about the evolution of network situational awareness.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Fri, Jan 23rd
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //