A quarter of European companies admit they were not aware of GDPR, with more than half unsure of the impact it will have, according to a new survey.
Poor business decisions can be very costly, especially in cybersecurity, where so-called false positives can have very damaging consequences.
A single protective technology means a single point of failure. A company aiming to build reliable and strong cybersecurity defenses should opt for a solution offering multiple complementary technologies.
World Day for Safety and Health at Work takes place on April 28th 2017. You should use this as an opportunity to improve your cybersecurity posture.
Humans make mistakes, and vulnerabilities can creep into projects unspotted. The more trusted eyes checking a service - with the approval of the systems' owners - the better.
Machine learning alone is not enough to protect endpoints and predicting an attacker's next moves. Other security solutions and human input are needed.
Machine learning (ML) is routinely cited by post-truth vendors as their biggest selling point, their main advantage. But ML – if it’s done properly – comes with problems and limitations.
Only 11% of positions in the global cybersecurity workforce are occupied by women. We take a look at why and what is being done to change this.
GDPR is coming into play in May 2018, but a lot of companies remain unprepared, which could have implications on how they process data.
There is no magic in machine learning. It's a field of computer science that gives computers the ability to find patterns in huge amounts of data.
Welcome to the beginning of a new series of short articles focused on the currents state of AI, all the ins and outs of machine learning, and how it affects cybersecurity.
With the recent big screen adaptation of Ghost in the Shell, we thought it would be a good idea to review some of the cybersecurity themes it explores.
How do you calculate the value at risk? Choosing between investing in antivirus software or doing nothing to prevent cybercrime is not black and white. We explore the grey areas of cybersecurity economics.
Cybersecurity legislation: organization, collaboration and diffusion across the globe, and working towards the populization of cybersecurity culture
Technology is affecting our relationships and changing our lives, but are we taking the necessary measures to protect ourselves online? Here's how to outsmart cybercriminals.
The Internet of Stranger Things came to life in the recent case of a cuddly connected toy, raising wider and deeper questions about cybersecurity, privacy, and the future of digital technology.
Bletchley Park, considered to be the birthplace of modern computing, is to train the generation of cybersecurity codebreakers.
Here at RSA, an increasing amount of security purchases are made by those who got the task dumped in their laps, but who have little or no formal or practical training.
Want to find holes in your security perimeter? What better way than to attempt to attack yourself, and here at RSA there are plenty of tools to help.
RSA feels like a mashup of giant tech Titans steadily swallowing up the little guys to make one massive, unholy tech monster. But how does that really work for small businesses as customers, and the rest of us?