Please turn on your JavaScript for this page to function normally.
drown
SOC analysts overloaded, but role more important than ever

Organizations are spending more to account for widespread security operation center (SOC) challenges including growing security management complexity, increasing analyst …

tools
Addressing the lack of knowledge around pen testing

The vast majority of attackers are opportunist criminals looking for easy targets to maximize their profits. If defenses are sufficiently fortified, finding a way through will …

cloud
How to make sure the switch to multicloud pays off

By now, the benefits of adopting a multicloud approach are well and truly out of the bag. By working with two or more cloud providers, companies can pick and choose offerings …

5G
The 5G toolbox of defense

For the mobile communications industry, security has always held a prominent role. However, the onset of 5G – which introduces new network architectures, services and devices …

thief
Working together to suppress complex and organized fraud

As the entire world has learned throughout 2020, effective suppression of the COVID-19 pandemic requires concerted responses and coordinated action. Medical professionals must …

money
CFOs taking strategic roles after overcoming COVID-19 challenges

CFOs are taking on greater strategic and enterprise-building roles after guiding their organizations through the challenges of COVID-19. CFO Research of Argyle Advisory & …

pills
Tech’s bigger role in pharma industry demands stronger security measures

For healthcare and pharmaceutical IT professionals, the launch of Amazon Pharmacy in late November signaled the acceleration of digitized pharma. But Amazon’s move into …

bomb
Disruption in 2020 paves the way for threat actors in 2021 and beyond

There’s no doubt that 2020 will be remembered for the uncertainty and rapid change it brought. As the global pandemic accelerated trends like remote working and digital …

gears
Security automation: Time for a new playbook

From increasingly sophisticated threats to the mad concoction of on-premise and cloud solutions that comprise most organizations’ IT infrastructure and the plethora of new IoT …

IoT
Researchers develop tool that automates device programming in the IoT

The Internet of Things (IoT) has ushered in a new era, with everyday items evolving into what we now refer to as cyber-physical systems. These systems are physical mechanisms …

lock
Secure enclave protection for AI and ML

You can’t swing a virtual bat without hitting someone touting the value of artificial intelligence (AI) and machine learning (ML) technologies to transform big data and human …

connection
Industrial pros looking for a more focused approach to digital transformation

A highly focused approach to digital transformation is challenging the traditional top-down, all-or-nothing strategy, according to a report from Plutoshift. The findings …

Don't miss

Cybersecurity news