Everything you need to know about… Cybersecurity
Cybercrime

Everything you need to know about… Cybersecurity

Updated May 2018 with our latest coverage…

Security is a topic that just can’t get out of the headlines. As businesses continue to fall victim to cybercriminals, cybersecurity teams are struggling to adapt to each new threat. However, by thinking about what we could be up against, and taking advantage of new technologies, the future of cybersecurity has started to look a little bit brighter.

Now, here’s everything you need to know. 

 

Getting to grips with IT security

What will be the single biggest security threat of 2018?

Our annual poll to find out what security professionals think the single biggest security threat of next year will be.

Same old, same old

Why do companies keep making the same mistakes when managing their cybersecurity?

Does the CISO role need to be formalised?

18 security experts share their views on whether the role of CISO should be more regulated.

An introduction to AI for security professionals

How using AI can help security professionals stay ahead.

Why cryptojacking is an overlooked security threat

How compute power from many organisations is being slyly diverted into cryptocurrency mining,

Hypervisor control: The next phase in the security arms race?

Hypervisor-based virtualised application protection tools enhance security, but there may be unintended consequences.

 

C-suite talk security

Insight from a CyberSecurity Expert

Malwarebytes CEO Marcin Kleczynski answers your questions on the cybersecurity landscape.

Welcome to the world of adversarial machine learning

Professor Giovanni Vigna, CTO and co-founder of Lastline, on why Machine Learning in security can be a tricky game.

Get used to ransomware and outages, says infrastructure exec

Data-centric economy needs to think differently about threat management and compliance.

 

Cybersecurity around the world

The foreign tech threat

Are foreign tech firms a threat to cybersecurity?

Why WannaCry might make Microsoft cry in China

China’s reliance on illegitimate software means it was hit even harder than the west.

Latin America makes excellent target for cybercriminals

Latin America needs to catch up on cybersecurity for the future.

US ‘hacking back’ law could create a cyber wild west of vigilantism

Security experts give their views on the Active Cyber Defense Certainty Act.

 

Is good hacking good business?

What you need to know about bug bounty programs

What it says on the tin.

How hackers hack

Research from Nuix gives insight into the thoughts and actions of professional hackers.

Who are today’s ethical hackers?

The who, where, and why of today’s ethical hacking armies.

Improve your security with hackers

Why companies are rewarding hackers for hacking them.

PREVIOUS ARTICLE

«Vodkalisation: Five vodkas to drink with these virtualisation white papers

NEXT ARTICLE

Will AI-based automation see humanity reach its own ‘peak horse’ moment soon?»
author_image
IDG Connect

IDG Connect tackles the tech stories that matter to you

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

Should the government regulate Artificial Intelligence?