Please turn on your JavaScript for this page to function normally.
SD-WAN
Finding the right SD-WAN in a crowded market

Software-defined wide area networks (SD-WAN) have become a staple for large organizations, helping them better communicate and interact with each other across the globe. But …

critical infrastructure
Critical infrastructure cyberattacks signaling the importance of prioritizing security

Armis released new data uncovering the lack of knowledge and general awareness of major cyberattacks on critical infrastructure and an understanding of security hygiene. The …

speed
Online brands prioritizing speed over security

Consumers around the world fear that businesses are now compromising online security in their efforts to deliver seamless digital experiences. According to a research released …

puzzle
What are the most common cybersecurity challenges SMEs face today?

Small and medium-sized enterprises (SMEs) are considered to be the backbone of Europe’s economy. 25 million SMEs are active in the EU, and employ more than 100 million …

stock price
Middle East ICT market expected to reach $95.05 billion by 2025

With the emphasis on reducing dependency on the oil industry, several Middle Eastern countries are formulating strategies to boost the contribution of the Information and …

Active Directory Security Tips From the Experts
eBook: Active Directory Security Tips From the Experts

Active Directory is central for many companies and used to authorize access at almost every level. Due to its popularity and importance, AD is a perfect target for ‘bad …

lock
How can a business ensure the security of their supply chain?

Since the SolarWinds’ supply chain attack, there has been an increased focus on how organizations of all sizes ensure the security of their suppliers. Large and small …

Good
Cybersecurity posture confidence high, yet incidents are increasing too

IronNet Cybersecurity released a report assessing timely topics such as the estimated cost per enterprise of the SolarWinds cyberattack, executive-level engagement in attack …

cyber insurance
Cyber insurance failing to live up to expectations

A RUSI paper finds that the contribution of the insurance sector to improving cyber security practice is ‘more limited than policymakers and businesses might hope’, and …

esignature
Digital signature market to grow steadily by 2030

Due to the burgeoning requirement for smooth digital transaction management and user authentication, the demand for digital signatures is rising rapidly. Moreover, the …

Panorays buyer's guide
Buyer’s guide: Questions to ask when evaluating third-party security management platforms

A comprehensive third-party security program can align your vendor’s security with your internal security controls and risk appetite. Such a program can also help you …

account
Platform or roaming FIDO2 authenticators: Which one is right for your workforce?

One of the main criticisms of any advanced authentication system is usability. In FIDO2 multi-factor authentication (MFA), platform authenticators aim to be the answer to our …

Don't miss

Cybersecurity news