News, trends and insights for cybersecurity in the digital age

Lemons, silos and trust issues: How to turn GDPR into lemonade


If you attend any of the numerous seminars about GDPR (the EU’s General Data Protection Regulation) nowadays, you’ll notice that the new rules are taking quite some flak. Invariably, some CIOs or CEOs from companies big and small will lament the administrative burden yet another EU regulation puts on them. Give me the place to […]

Carriers collaborating to improve mobile security


One of the biggest challenges for enterprise IT managers today is securing mobile devices. While the major obstacles to mobile security (as all IT pros know) are users, technology vulnerabilities also play a part in making mobile devices a risk to enterprise networks and data. That’s because users often are forced to jump through multiple […]

What’s behind the rise of cloud-native applications


When the cloud first came along, it was all about migrating existing applications to early public web services such as Amazon Web Services (AWS), Rackspace’s OpenStack-powered cloud, or Microsoft Azure. Any apps you ran on servers in your data centers were virtualized as fast as possible and deployed to the cloud. For some of you, […]

How to Avoid a Ransomware Attack

Computer Security

Ransomware has been identified as a major security threat and a criminal enterprise that costs companies billions in losses annually. It’s time to protect your organization from potential attacks. Companies need a solution that assesses an organization’s ability to withstand ransomware attacks that target users, applications and infrastructure and then recommends actions for optimizing a […]

2 New Business Processes Key to GDPR Compliance

With the rise of the European Union’s General Data Protection Regulation (GDPR), your customers’ personal data is about to gain a great deal of value. As that happens, your organization will need not only new technologies, but also new processes and behaviors. We’ve all become more active users of the internet and mobile channels. As […]

Your company has been hit with ransomware: What’s the best response?


Organizations hit with ransomware must first decide if they are going to pay the ransom. Although law enforcement adheres to a strict party-line policy of not negotiating with the extortionists, nuances do exist. Companies need to understand the full spectrum of options, how interactions with the criminals may evolve and how to position the business […]

Survey: Formal Education Leaves Software Developers Short on Security

Computer Programming

Recently released research has revealed that formal software education does little to prepare developers for today’s DevOps teams. In fact, 76 percent of developers indicated security and secure development education needed for today’s world of coding is missing from formal curricula. The study, commissioned by Veracode and conducted by, surveyed nearly 400 DevOps professionals […]

Q is for quantum computing

This post is part of a series, “Digital: From A to Z,” that explores what it means to be digital. What’s in your A to Z of digital? Find me on Twitter @Max_Hemingway or leave a comment below. Quantum computer: A computer which makes use of the quantum states of subatomic particles to store information. (Source: English […]

Smishing is the latest way scammers exploit your mobile users

Mobile Phone Texting

If there’s one thing enterprise IT professionals and cyber criminals can agree on, it’s that the biggest points of vulnerability in any network are users. Mobile users especially will do the darnedest things! They’ll lose their unsecured phones, download apps from sketchy third-party sites, and access confidential enterprise data using public wi-fi. The seemingly limitless […]

Getting the analytics right for GDPR compliance – and beyond

The challenges of complying with the European Union’s new General Data Protection Regulation (GDPR) are clear: Every organization serving customers in the EU — including organizations outside the EU that offer goods or services to individuals within it — will need to comply with new data privacy rules by May 2018. The clock is ticking, […]