Please turn on your JavaScript for this page to function normally.
Cloud
For adapting to new cloud security threats, look to “old” technology

With remote work and reliance on cloud computing here to stay, it’s no surprise how many headlines there are to address the growing cloud security concerns in our industry. …

hand
Five proven techniques for building effective fraud management

Effective management of fraud has long been a vital capability within organizations, and for good reasons. According to the Association of Certified Fraud Examiners’ …

Large ransom demands and password-guessing attacks escalate

ESET released a report that summarizes key statistics from its detection systems and highlights notable examples of its cybersecurity research. The latest issue of the report …

gears
How CISOs plan to accelerate the adoption of automation

ThreatQuotient released the State of Cyber Security Automation Adoption in 2021, new research focused on understanding the importance, challenges and trends facing businesses …

chess
The cybersecurity issues organizations deal with remain complex and numerous

New thinking on cybersecurity policies, processes, people and products are necessary for organizations to reverse perceptions, and perhaps realities, that they are falling …

application
Domain security remains an underutilized component to curb attacks

Despite the shift to modernize business environments and operations among the Global 2000 companies, web domains remain dangerously under protected, according to CSC. CSC’s …

Bug
Security and trust in software remains top priority for buyers

Faster decision making, credit card transactions instead of negotiated contracts, and the near-ubiquitous use of peer review sites are all part of the new normal in enterprise …

shield
Combating vulnerability fatigue with automated security validation

Security operations teams have been dealing with “alert fatigue” for far too long. The introduction of log monitoring (e.g., SIEM), firewall, and AV technologies over two …

collaboration
How collaboration between IT pros and senior leaders could drive the future of risk mitigation

What is an acceptable level of risk for IT pros and their organizations? The answer to this question has changed in recent years, with the threat landscape shifting …

account
Erosion of digital trust: Consumers want more personal information protection

Consumers think banks, retailers and mobile operators need to do more to protect them and their personal information from fraudsters, according to Callsign. Trust in these …

innovation
The future role of data, AI and the cloud

The potential for cloud technologies to break down silos and enable more contextualized views of data is having a dramatic impact on enterprise investment priorities for …

week in review
Week in review: 3 ways to guard against insider threats, cybersecurity posture validation

Here’s an overview of some of last week’s most interesting news, articles and interviews: Official (ISC)² CISSP CBK Reference: Out with the old, in with the new …

Don't miss

Cybersecurity news