Leveraging security analytics to investigate and hunt modern threats

In a new interview, Gary Golomb, co-founder at Awake Security, talks about how machine learning help develop a scalable enterprise cybersecurity plan, what technologies can make a security analyst’s job easier, he outlines the essential building blocks of a modern SOC, and much more. We’ve been hearing a lot about machine learning and ways it can […]

Consumers prefer security over convenience for the first time ever, IBM Security report finds

Slowly but surely, the users are coopting for security over convenience in online usage. Barely a year ago, consumer convenience trumped over security with Internet users preferring products and services which offered them fastest solutions. A new study by IBM Security surveying 4,000 adults from a few different regions of the world found that consumers […]

Microsoft: How the Threat Landscape Will Shift This Year

Unlike security professionals, who have stressed over digital threats for years, most average consumers didn’t recognize the importance of security until 2017. “Grandmothers and grandfathers and moms and dads are now aware of cyber intrusions,” says David Weston, principal security group manager for the Windows Enterprise and Security team at Microsoft. “It’s amazing, but it […]

BlackBerry CSO: Security will continue to be a ‘cat-and-mouse’ game

Security, they say, is the weakest link but as clichéd as that sounds, this adage is in fact truer in today’s world than before. And for one expert, the day that cyber-security catches up with cyber-crimes and threats isn’t going to come. Read why Alex Manea of BlackBerry Ltd says that cyber security will continue […]

Xerox CISO: How business should prepare for future security threats

The pace of change for the security threat landscape is accelerating. To cope with the change and ensure success against adversaries, Xerox Chief Information Security Officer (CISO) Dr. Alissa Johnson believes the security community needs to rethink the way it anticipates and responds to threats. Read the interview with Dr. Alissa Johnson, CISO at Xerox who […]

Businesses and GDPR: What they need to do to be compliant?

Enforcement of General Data Protection Regulation (GPDR) is now just few months away. The media have intensively examined and written about this topic from practically every angle since it became legislation. Businesses continue to struggle with both understanding and implementation of what they need to do to be compliant. Read ESET’s Tony Anscombe’s interview about how […]

Fighting cybersecurity threats through User Behaviour Analytics and Defense in Depth approach

OpenGov speaks to David Barton, Chief Information Security Officer at Forcepoint LLC. Mr. Barton has over 20 years of experience in security leadership roles across a variety of industries including telecommunications, healthcare, software development, finance, and government. Read the interview with David Barton of Forcepoint LLC who explains how businesses can fight cyber threats through User behaviour […]

Companies Need to ‘Think Twice’ Before Retaliating Against Hackers

Earlier this month, two members of the House of Representatives Tom Graves (R-GA) and Kyrsten Sinema (D-AZ) introduced a bill called Active Cyber Defense Certainty Act, dubbed the “hack back” bill, which would allow companies to hack the hackers who infiltrate their computer networks to retrieve or delete stolen data and find the culprits’ true […]

CSO Interview: Must-have Skills for New-age Cyber Security Professionals

While the market is getting overwhelmed and proliferated with new age disruptive technologies like IoT, AI and Blockchain, the complexity of cyber-attacks has also increased, says Vimal Mani, CISO, Bank of Sharjah . Read Vimal Mani of Bank of Sharjah lists must-have skills for new cyber security professionals on Gizmodo.

Secure Solutions for the Internet of Things

As a firm comprised of veterans from Apple, Google, Amazon Lab126 and other tech industry giants, Afero is well-poised as a developer of encryption and authentication technologies designed for Internet of Things security. We told you recently about their Modulo-2 development kit. Read the interview with Joe Britt of Afero who gives some secure solutions for […]