Please turn on your JavaScript for this page to function normally.
gears
Cybersecurity is driving digital transformation in alternative investment institutions

As the alternative investment industry tackles a rapidly changing threat landscape, increased regulation, and a continuous need to innovate, most firms are increasing their DX …

magnifying glass
The challenges and advantages of building behavior-based threat detection

In this video for Help Net Security, Scott Sutherland, Senior Director, Adversary Simulation and Infrastructure Testing, NetSPI, discusses how, in order to stay ahead of …

eavesdropping
How businesses are prioritizing data privacy

In 2021, the demand for data privacy jobs soared with no indication of slowing down and stemming from the proliferation of new government regulations and cloud migration. In …

shield
Detection, isolation, and negotiation: Improving your ransomware preparedness and response

The risks presented by ransomware and cyber extortion events have likely found a place in your own security team’s discussions, and rightfully so. Ransomware attacks have …

strategy
Trends to watch when creating security strategy for the next two years

Executive performance evaluations will be increasingly linked to ability to manage cyber risk; almost one-third of nations will regulate ransomware response within the next …

tools
iPaaS: The latest enterprise cybersecurity risk?

iPaaS apps are vulnerable because they transport highly sensitive data from core systems, include many different third-party apps in the process, and often lack security tools …

idea
How companies are prioritizing infosec and compliance

New research conducted by Enterprise Management Associates (EMA), examines the impact of the compliance budget on security strategy and priorities. It describes areas for …

network
Despite known security issues, VPN usage continues to thrive

VPN usage is still prevalent among 90% of security teams who have highlighted cost, time, and difficulty as reasons to not move forward with ZTNA adoption, according to a new …

up
Rate of IT security incidents grows with company size

The rate of IT security incidents increases the more Microsoft 365 security features are used, according to Hornetsecurity. Organizations using Microsoft 365 and that use 1 or …

Door
How the blurring of the “supply chain” opens your doors to attackers—and how you can close them

There have been more than 200 dedicated supply chain attacks over the past decade. Some of these campaigns have affected countless supplier networks and millions of customers …

SaaS
SaaS security: How to avoid “death by 1000 apps”

SaaS applications have become synonymous with modern business environments, and CISOs and security teams struggle to find a happy medium between ensuring the security of their …

organize
Recovery and resilience: CISO insights into the 2022 cybersecurity landscape

I recently had the opportunity to meet and speak with several luminaries of the global security ecosystem: Roger Hale – Chief Security Officer at Agora; Sounil Yu …

Don't miss

Cybersecurity news