Please turn on your JavaScript for this page to function normally.
digital transformation
There is no good digital transformation without cybersecurity

Network engineers and CIOs agree that cybersecurity issues represent the biggest risk for organizations that fail to put networks at the heart of digital transformation plans. …

compliance
Moving toward a more adaptable and tech-driven compliance function

A growing global regulatory focus on consumer privacy and data protection, along with new sustainability measurement and reporting laws is furthering the importance of …

firefighters
Why are current cybersecurity incident response efforts failing?

Business-critical applications, such as enterprise resource planning (ERP) systems provided by SAP and Oracle, are considered the crown jewels of the enterprise. These assets …

data
Most organizations do not follow data backup best practices

Apricorn announced new findings from a survey, which revealed that while the majority organizations have data backup plans in place, data for many are at risk. Nearly 400 …

snake, threat
How confident are companies in managing their current threat exposure?

Crossword Cybersecurity has released a report based on the findings of a survey of over 200 CISOs and senior UK cyber security professionals. The paper reveals companies are …

secure
Where is attack surface management headed?

Reactive cyber defense is a losing strategy. It’s something that’s been tolerated for many decades, but isn’t it more cost-effective, better for the brand, and more optimal to …

stop
Why cyber security can’t just say “no“

There was a time, not long ago, when there were only so many ways of accomplishing an information technology task. Whether you were building a website, setting up a new …

The SaaS-to-SaaS supply chain is a wild, wild mess

Cloud migration and IT democratization have created a continuously growing network of interconnected business applications, integrated to digitize and automate business …

DDoS
Why are DDoS attacks so easy to launch and so hard to defend against?

DDoS attacks are an underappreciated residual risk for most organizations today. While most people are concerned about ransomware, it typically takes a ransomware attacks …

ransomware
Ransomware works fast, you need to be faster to counter it

Since the pandemic hit and organizations had to quickly adjust to widespread remote work and stand up hybrid environments, ransomware gangs have been having a field day. In …

password
Password reuse is rampant among Fortune 1000 employees

SpyCloud published an annual analysis of identity exposure among employees of Fortune 1000 companies in key sectors such as technology, finance, retail and telecommunications. …

insider threat
How to set up a powerful insider threat program

Security spend continues to focus on external threats despite threats often coming from within the organization. A recent Imperva report (by Forrester Research) found only 18 …

Don't miss

Cybersecurity news