Security News
Matt Lock of Varonis on the Need to Have a Baseline for Data Access BehaviorGDPR requires organizations to "have a governance model in terms of access and control and accountability," says Matt...
Learn the tenets of the AWS Well-Architected Framework’s Security pillar Promo The Amazon Web Services (AWS) Well-Architected Framework is designed to assist organizations in building secure,...
There will be no lack of interesting content from Qualys at Infosecurity Europe this year. Depending on you interests, you might want to make time for some of these talks and presentations. Visit...
The growing demand for faster software delivery, using public cloud environments, microservices, and containers, has triggered a discussion on the role of security in the world of DevOps. read more
Research has shown that the safest businesses know their digital weaknesses, preemptively identify any potential hacker targets, and hire a diverse cyber intelligence team.
Nearly two-thirds (64%) of employees use a company-approved device for work. However, less than half (40%) of those who use a personal device are regulated when using that personal device,...
There will be no lack of interesting content from Qualys at this year’s RSA Conference. Depending on you interests, you might want to make time for some of these talks and presentations. Visit...
IT security and privacy, IT governance and risk management, regulatory compliance, emerging technology and cloud computing are the key issues impacting IT audit plans in 2018, according to a...