Business resilience should be a core company strategy, so why are businesses struggling to take action?
A recent survey showed that only 51% of U.S. business decision makers say their organization is definitely as resilient as it needs to be against disruptions such as cyber …
Beware the man in the cloud: How to protect against a new breed of cyberattack
One malicious tactic that has become quite prevalent in recent years is known as a ‘man in the cloud’ (MitC) attack. This attack aims to access victims’ accounts without the …
Cybercrime could cost companies trillions over the next five years
Companies globally could incur $5.2 trillion in additional costs and lost revenue over the next five years due to cyberattacks, as dependency on complex internet-enabled …
Protecting privileged access in DevOps and cloud environments
While security strategies should address privileged access and the risk of unsecured secrets and credentials, they should also closely align with DevOps culture and methods to …
How to build a better CISO
The technology industry has long been categorized by its ability to transform at the blink of an eye. If you think back 20 years, the internet was just picking up consumer …
Strategies for expertly protecting industrial control systems
Andrew Ginter is the Vice President of Industrial Security at Waterfall Security Solutions. We sat down with him to learn more about his new book, Secure Operations …
Why security by design and security DevOps are so critical to success
The advances made in technology throughout the past several decades have brought about an inevitable digital transformation, which companies are experiencing in today’s world. …
Deception for proactive defense
This article is fourth in a five-part series being developed by Dr. Edward Amoroso in conjunction with the deception technology team from Attivo Networks. The article provides …
Modern CISO challenges: Implementing DevSecOps, improving security operations
We sat down with Aaron Contorer, CEO at FP Complete, to learn more about what enterprises can do to increase their cybersecurity, the challenges related to DevSecOps …
Encryption backdoors open a Pandora’s Box for cybersecurity
The amount of encrypted traffic online has grown exponentially. This growth has occurred in the wake of the Snowden revelations, as well as the continuous stream of stories …
Is Privileged Access Management still a pain?
Every week seems to bring the story of a new customer data breach, but regardless of the individual details, the majority of incidents have one trait in common. The chances …
The rising importance of Data Loss Prevention in today’s data protection landscape
In this podcast, Roman Foeckl, founder and CEO of CoSoSys, talks about the growing importance of Data Loss Prevention at both endpoint and development level. Here’s a …