Please turn on your JavaScript for this page to function normally.
shield
Combating vulnerability fatigue with automated security validation

Security operations teams have been dealing with “alert fatigue” for far too long. The introduction of log monitoring (e.g., SIEM), firewall, and AV technologies over two …

collaboration
How collaboration between IT pros and senior leaders could drive the future of risk mitigation

What is an acceptable level of risk for IT pros and their organizations? The answer to this question has changed in recent years, with the threat landscape shifting …

account
Erosion of digital trust: Consumers want more personal information protection

Consumers think banks, retailers and mobile operators need to do more to protect them and their personal information from fraudsters, according to Callsign. Trust in these …

innovation
The future role of data, AI and the cloud

The potential for cloud technologies to break down silos and enable more contextualized views of data is having a dramatic impact on enterprise investment priorities for …

week in review
Week in review: 3 ways to guard against insider threats, cybersecurity posture validation

Here’s an overview of some of last week’s most interesting news, articles and interviews: Official (ISC)² CISSP CBK Reference: Out with the old, in with the new …

car
Today’s cars are mobile data centers, and that data needs to be protected

In a recent report, AlixPartners estimate that the global microchip shortage will cost car manufacturers $110 billion dollars in 2021, through the lost production of around …

connection
Content sprawl is increasing the risk of data breaches and leaks

Egnyte’s latest report, based on a survey of 400 IT executives, examines the challenges of securing and governing unstructured content in today’s hybrid and remote work …

click
Cybercrime awareness heightened, yet people still engage in risky online behaviors

76% of Americans recognize that data breaches are serious, showing a high awareness that may be driven by news of major consumer, enterprise, and infrastructure breaches over …

Fire
How cybercrime hurts some groups more than others

Trends in cybercrime mirror the widening digital divide accelerated by the pandemic leaving lower income and vulnerable audiences disproportionally impacted. A new report by …

arrows
Evolving beyond RBAC: Why ABAC is the future

In the advent of a “work anywhere, anytime” environment, enterprises face a rapid expansion of diverse users alongside an influx of applications, devices, APIs and …

idea
Three areas legal leaders should focus their technology efforts in

As legal and compliance teams have faced acute pressures since the global pandemic and are struggling to manage their workload, legal leaders should focus their technology …

5G
5G connections reached 429 million in Q2 2021

Subscriber adoption of the fifth generation of wireless (5G) has increased significantly, as global wireless 5G connections for the second quarter (Q2) of 2021 reached 429 …

Don't miss

Cybersecurity news