automation
How to achieve digital dexterity with a predominantly hybrid workforce
The COVID-19 pandemic and the consequent switch to remote working changed many an office’s culture forever. Fast forward to a year later, and businesses are either continuing …
Enterprise automation adoption surging, security and compliance area jump by 171%
Workato unveiled a data report focused on the key trends that shaped automation over the past year. The anonymised data reveals major shifts in automation priorities as …
Protecting your company from fourth-party risk
In a world that is becoming ever more interconnected, organizations are learning firsthand that they are not only vulnerable to the adverse events that their vendors …
The role of automation in staying on top of the evolving threat landscape
In this interview with Help Net Security, Dr Shreekant Thakkar, Chief Researcher, Secure Systems Research Centre at TII, talks about the ever evolving threat landscape and how …
Organizations struggling to develop cloud applications that meet security requirements
According to a Security Compass research, in mid-sized to large enterprises, 50% of the software applications being developed are cloud based, and another 30% are expected to …
Out with the old, in with the new: From VPNs to ZTNA
The VPN held an important role in the evolution of the internet, and for decades has supported businesses in securing their networks. VPNs have been used by businesses and …
The cybersecurity metrics required to make Biden’s Executive Order impactful
For too long, both the private and public sectors have not prioritized cybersecurity efforts enough and only acted in “good faith” – an inadequate effort to improve …
Why companies should never hack back
After major cyberattacks on the Colonial Pipeline and on meat supplier JBS, the idea of allowing companies to launch cyberattacks back at cyber criminals was proposed. This …
Consumers value privacy more than potential savings when purchasing insurance
A recent survey by Policygenius explored consumer sentiment toward new tech being deployed by home and auto insurance companies. The survey found that most consumers prefer …
How do I select an automated red teaming solution for my business?
Red teaming is an essential part of an organization’s security assessment process. It is generally done manually to uncover possibile vulnerabilities and security gaps, …
Security and compliance still a challenge for container architectures
While adoption of container architectures and microservices continues at an impressive pace, maintaining automated and proactive security and compliance is a particularly …
Why automated pentesting won’t fix the cybersecurity skills gap
The modern threat landscape is an enormous challenge for the modern enterprise. Many organizations are “addressing” this by buying the newest security products from the latest …
Featured news
Resources
Don't miss
- Mirai botnet behind the largest DDoS attack to date
- 48,000+ internet-facing Fortinet firewalls still open to attack
- Acronis CISO on why backup strategies fail and how to make them resilient
- Ransomware attackers are “vishing” organizations via Microsoft Teams
- Scam Yourself attacks: How social engineering is evolving