Doug Drinkwater

Doug is the international editor of TabTimes.com.

6 use cases for blockchain in security

6 ways hackers will use machine learning to launch attacks

6 ways hackers will use machine learning to launch attacks

Machine learning algorithms will improve security solutions, helping human analysts triage threats and close vulnerabilities quicker. But they are also going to help threat actors launch bigger, more complex attacks.

What is DevSecOps? Developing more secure applications

What is DevSecOps? Developing more secure applications

DevSecOps is about introducing security earlier in the life cycle of application development, thus minimizing vulnerabilities and bringing security closer to IT and business objectives.

5 top machine learning use cases for security

5 top machine learning use cases for security

Machine learning will make sense of the security threats your organization faces and help your staff focus on more valuable, strategic tasks. It could also be the answer to the next WannaCry.

What is quantum encryption? It’s no silver bullet, but could improve security

What is quantum encryption? It’s no silver bullet, but could improve security

In the arms race between white and black hats, the infosec industry looks to quantum encryption and quantum key distribution (QKD). That may be just part of the answer, however.

Famous malware threats: Where are they now?

Famous malware threats: Where are they now?

The headlines may be dominated by news of NotPeyta and Wannacry, but watch out for the ‘golden oldie’ malware like Conficker and Zeus. They are still dangerous.

Preparing for GDPR compliance: Where you need to be now and how to get there

Preparing for GDPR compliance: Where you need to be now and how to get there

Failure to comply with the EU General Data Protection Regulation (GDPR) leaves firms vulnerable to penalties, but many U.S. companies doing business in Europe are in danger of missing the deadline. Here’s how to catch up.

10 steps for a successful incident response plan

10 steps for a successful incident response plan

Incident response plans are often left unused, leaving firms far less able to detect and respond to cyber attacks or data breaches. Here’s our 10-point plan to ensure you set up -- or improve -- an IR plan that actually works.

How to stop wasting money on security shelfware

How to stop wasting money on security shelfware

Investing in security tools that end-up on the shelf or underutilized is not inevitable, and it can be reduced or even eliminated by some proactive and surprisingly simple first steps.

What's the key to surviving as a cyber-security start-up?

What's the key to surviving as a cyber-security start-up?

It’s always a gamble to establish a start-up, but if you were to choose any sector where you’d fancy your chances of success, it would surely be cyber-security.

AI will transform information security, but it won’t happen overnight

AI will transform information security, but it won’t happen overnight

Artificial Intelligence technologies are evolving quickly, but can they aid an InfoSec community still grappling with default passwords and SQLi attacks?

Friends or enemies? Security vendors tiptoe towards collaboration

Friends or enemies? Security vendors tiptoe towards collaboration

The information security vendor community is extremely competitive. But when all suppliers supposedly share the common goal of making us as citizens and businesses secure, should they be doing more to work together?

Load More