Doug Drinkwater

Doug is the international editor of TabTimes.com.

GDPR-defined personal data can be hard to find—here's where to look

What is security’s role in digital transformation?

What is security’s role in digital transformation?

Digital transformation is front of mind for many senior executives, but too often security is left behind.

What is a virtual CISO? When and how to hire one

What is a virtual CISO? When and how to hire one

A virtual CISO (vCISO) can bring both strategic and operational leadership on security to companies that can't afford a full-time person in the role.

6 use cases for blockchain in security

6 use cases for blockchain in security

Blockchain has the potential to improve encryption and authentication, and that could be good news for IoT security and DDoS protection.

6 ways hackers will use machine learning to launch attacks

6 ways hackers will use machine learning to launch attacks

Machine learning algorithms will improve security solutions, helping human analysts triage threats and close vulnerabilities quicker. But they are also going to help threat actors launch bigger, more complex attacks.

What is DevSecOps? Developing more secure applications

What is DevSecOps? Developing more secure applications

DevSecOps is about introducing security earlier in the life cycle of application development, thus minimizing vulnerabilities and bringing security closer to IT and business objectives.

5 top machine learning use cases for security

5 top machine learning use cases for security

Machine learning will make sense of the security threats your organization faces and help your staff focus on more valuable, strategic tasks. It could also be the answer to the next WannaCry.

What is quantum encryption? It’s no silver bullet, but could improve security

What is quantum encryption? It’s no silver bullet, but could improve security

In the arms race between white and black hats, the infosec industry looks to quantum encryption and quantum key distribution (QKD). That may be just part of the answer, however.

Famous malware threats: Where are they now?

Famous malware threats: Where are they now?

The headlines may be dominated by news of NotPeyta and Wannacry, but watch out for the ‘golden oldie’ malware like Conficker and Zeus. They are still dangerous.

Preparing for GDPR compliance: Where you need to be now and how to get there

Preparing for GDPR compliance: Where you need to be now and how to get there

Failure to comply with the EU General Data Protection Regulation (GDPR) leaves firms vulnerable to penalties, but many U.S. companies doing business in Europe are in danger of missing the deadline. Here’s how to catch up.

10 steps for a successful incident response plan

10 steps for a successful incident response plan

Incident response plans are often left unused, leaving firms far less able to detect and respond to cyber attacks or data breaches. Here’s our 10-point plan to ensure you set up -- or improve -- an IR plan that actually works.

How to stop wasting money on security shelfware

How to stop wasting money on security shelfware

Investing in security tools that end-up on the shelf or underutilized is not inevitable, and it can be reduced or even eliminated by some proactive and surprisingly simple first steps.

Load More