Please turn on your JavaScript for this page to function normally.
SASE
Transitioning to a SASE architecture

There are several key points when contemplating a change in your security architecture. First, and foremost, there is still a security perimeter. The perimeter, however, is …

money
What IT leaders are prioritizing in network security investments?

Distinct priorities have emerged when it comes to responding to the needs of IT security’s rapid transformation, a Pulse Media research has found. The survey of 239 …

endpoint protection
67% of IT pros concerned with teleworking endpoint misuse

43.13% of workers will stay remote after the pandemic ends and two out of three IT professionals are concerned with teleworking endpoint misuse, a new Prey study reveals. The …

cloud binary
Improper cloud IAM leaving organizations at risk

There is an industry-wide cloud permissions gap crisis, leaving countless organizations at risk due to improper identity and access management (IAM), a CloudKnox Security …

shield
How to address post-pandemic infrastructure pain points

Like bankruptcy, falling asleep, or even falling in love, today’s infrastructure and security pain points develop first gradually, and then all at once. The coronavirus …

Salesforce
Using Salesforce? Here are 5 security and compliance considerations

When it comes to mission-critical cloud applications, today’s security teams have a laundry list of different focus areas. From ensuring cloud providers deliver adequate …

idea
4 things you can do to minimize cyberattacks on supply and value chains

Supply chain attacks target the weakest spot in most every enterprise’s security program: third-party access. The SolarWinds hack was a classic supply chain attack, …

SASE
SASE or zero trust? Why security teams should be using both

As companies continue to navigate increasingly distributed environments, the question of zero trust is coming up more and more – as is the relationship between this …

architecture
Hybrid IAM: Addressing the security and experience issues caused by hybrid IT

More than 80% of global IT decision-makers have already adopted, or plan to adopt or expand, cloud-based identity and access management (IAM) initiatives over the next two …

zero trust
The importance of a zero trust-based approach to identity security

97 percent of senior security executives say attackers are increasingly trying to steal one or more types of credentials, a CyberArk survey reveals. As organizations move …

user
As DX acceleration continues, identity and zero trust need to be central in all business decisions

The pandemic-driven shift to remote work has significantly changed how companies are investing in identity and access management capabilities and zero trust security, …

Hands
A great deal of employees have inappropriate access to sensitive data

The onset of COVID-19 and resulting distributed workforce have introduced new and complex challenges for businesses, with 45% of IT decision-makers reporting increased …

Don't miss

Cybersecurity news