Defense in depth: Layering your security coverage
The more valuable a possession, the more steps you take to protect it. A home, for example, is protected by the lock systems on doors and windows, but the valuable or sensitive items that a criminal...
View ArticleNIST’s security transformation: How to keep up
One thing that came out of the pandemic years was a stronger push toward an organization-wide digital transformation. Working remotely forced companies to integrate digital technologies, ranging from...
View ArticleData security tools make data loss prevention more efficient
As businesses navigate the complexities of modern-day cybersecurity initiatives, data loss prevention (DLP) software is the frontline defense against potential data breaches and exfiltration. DLP...
View ArticleEmpowering cybersecurity leadership: Strategies for effective Board engagement
With the increased regulation surrounding cyberattacks, more and more executives are seeing these attacks for what they are – serious threats to business operations, profitability and business...
View ArticleThe evolution of ransomware: Lessons for the future
Ransomware has been part of the cyber crime ecosystem since the late 1980s and remains a major threat in the cyber landscape today. Evolving ransomware attacks are becoming increasingly more...
View ArticlePentesting vs. Pentesting as a Service: Which is better?
In today’s quickly evolving cybersecurity landscape, organizations constantly seek the most effective ways to secure their digital assets. Penetration testing (pentesting) has emerged as a leading...
View ArticleOperationalize cyber risk quantification for smart security
Organizations constantly face new tactics from cyber criminals who aim to compromise their most valuable assets. Yet despite evolving techniques, many security leaders still rely on subjective terms,...
View ArticleUnified endpoint management for purpose-based devices
As purpose-built devices become increasingly common, the challenges associated with their unique management and security needs are becoming clear. What are purpose-built devices? Most fall under the...
View ArticleWhat cybersecurity pros can learn from first responders
Though they may initially seem very different, there are some compelling similarities between cybersecurity professionals and traditional first responders like police and EMTs. After all, in a world...
View ArticleTaking the complexity out of identity solutions for hybrid environments
For the past two decades, businesses have been making significant investments to consolidate their identity and access management (IAM) platforms and directories to manage user identities in one...
View ArticleHow the White House sees the future of safeguarding AI
On October 30, 2023, President Biden issued an executive order (EO) to set new standards for the safety and security of Artificial Intelligence (AI). The move sets out the government’s intentions to...
View ArticleBest practices for cloud configuration security
Cloud computing has become an integral part of IT infrastructure for businesses of all sizes, providing on-demand access to a wide range of services and resources. The evolution of cloud computing has...
View ArticleAccelerating security outcomes with a cloud-native SIEM
As organizations modernize their IT infrastructure and increase adoption of cloud services, security teams face new challenges in terms of staffing, budgets and technologies. To keep pace, security...
View ArticleWeb injections are back on the rise: 40+ banks affected by new malware campaign
Web injections, a favored technique employed by various banking trojans, have been a persistent threat in the realm of cyberattacks. These malicious injections enable cyber criminals to manipulate...
View Article5 common data security pitfalls — and how to avoid them
Data protection has come a long way. In previous years, it was considered a “nice to have” and a line item on the budget further down the page. Today, it’s top of mind for almost every CIO or CISO...
View ArticleAre you tracking your cybersecurity implementation?
From May 7 to 12, 2021, the massive Colonial Pipeline refined oil product delivery system ground to a halt. It was the victim of a DarkSide ransomware cyberattack. The Colonial Pipeline delivers about...
View ArticleRoundup: Federal action that shaped cybersecurity in 2023
As 2023 draws to a close, it’s time to look back on our top five federal cyber stories of the year: a compilation of pivotal moments and key developments that have significantly shaped the landscape...
View ArticleWhat the cybersecurity workforce can expect in 2024
For cybersecurity professionals, 2023 was a mixed bag of opportunities and concerns. The good news is that the number of people in cybersecurity jobs has reached its highest number ever: 5.5 million,...
View ArticleIT and OT cybersecurity: A holistic approach
In the realm of cybersecurity, both information technology (IT) and operational technology (OT) present distinct challenges that organizations must navigate. Ensuring the security of these distinct...
View ArticleCybersecurity trends: IBM’s predictions for 2024
From world events to the economy, 2023 was an unpredictable year. Cybersecurity didn’t stray far from this theme, delivering some unexpected twists. As organizations begin planning their security...
View Article
More Pages to Explore .....