Trends
Top hashtags
Top influencers
Top sources
Monthly report: November 2019
This month, The Essentials Report, has curated & analyzed the content published by 132 influencers like BrianHonan and Graham Cluley, discussing hashtags such as #cybersecurity , #privacy and #irisscon.
Read our monthly report or learn more about Essentials.
What matters to our readers VS what matters to the rest of the world in November 2019
Popular with our readers
Best articles in November 2019
I'm the Google whistleblower. The medical data of millions of Americans is at risk
When I learned that Google was acquiring the intimate medical records of 50 million patients, I couldn’t stay silent
I'm the Google whistleblower. The medical data of millions of Americans is at risk
When I learned that Google was acquiring the intimate medical records of 50 million patients, I couldn’t stay silent
Irisscon 2019: the human factor as a cybersecurity threat
An overview of IRISSCON 2019. In depth knowledge and advice on many issues in the industry such as the human factor as a cybersecurity threat were shared.
Irisscon 2019: the human factor as a cybersecurity threat
An overview of IRISSCON 2019. In depth knowledge and advice on many issues in the industry such as the human factor as a cybersecurity threat were shared.
CISO faces breach on first day on the job
CISO Jaya Baloo has learned many things from her years as a security manager, including how to place people above systems and create a solid infrastructure plan, and the best ways to fight the bad guys. @Enterprisenxt
CISO faces breach on first day on the job
CISO Jaya Baloo has learned many things from her years as a security manager, including how to place people above systems and create a solid infrastructure plan, and the best ways to fight ...
To Survive a Data Breach, Create a Response Playbook
Surviving a data breach requires having a plan, and experts say such plans must be continually tested, practiced and refined. They describe seven essential
To Survive a Data Breach, Create a Response Playbook
Surviving a data breach requires having a plan, and experts say such plans must be continually tested, practiced and refined. They describe seven essential
Cybersecurity Risk is Growing, and We Are Not Ready
Research from Infosecurity Group and ISACA reveals a big gap between knowledge of cybersecurity risk and preparedness for it
Cybersecurity Risk is Growing, and We Are Not Ready
Research from Infosecurity Group and ISACA reveals a big gap between knowledge of cybersecurity risk and preparedness for it
ePrivacy: EU Member States push crucial reform on privacy norms close to a dead end
In this era of disinformation and privacy scandals, refusing to ensure strong privacy protections in the ePrivacy Regulation is a step backwards for the EU.
ePrivacy: EU Member States push crucial reform on privacy norms close to a dead end
In this era of disinformation and privacy scandals, refusing to ensure strong privacy protections in the ePrivacy Regulation is a step backwards for the EU.
General election 2019: 'Cyber-attack' on Labour Party digital platforms
The party says the DDoS attack against its systems failed, but an online campaign tool was disrupted.
General election 2019: 'Cyber-attack' on Labour Party digital platforms
The party says the DDoS attack against its systems failed, but an online campaign tool was disrupted.
Attention cybersecurity entrepreneurs: CISOs want simplicity!
The cybersecurity market has matured from reactive to proactive cybersecurity technology integration. Top CISOs and industry experts weigh in on how new entrants into the cybersecurity marketplace can shape their value propositions to make the most of the changing market.
Attention cybersecurity entrepreneurs: CISOs want simplicity!
The cybersecurity market has matured from reactive to proactive cybersecurity technology integration. Top CISOs and industry experts weigh in on how new entrants into the cybersecurity ...