cybersecurity
Content sprawl is increasing the risk of data breaches and leaks
Egnyte’s latest report, based on a survey of 400 IT executives, examines the challenges of securing and governing unstructured content in today’s hybrid and remote work …
How cybercrime hurts some groups more than others
Trends in cybercrime mirror the widening digital divide accelerated by the pandemic leaving lower income and vulnerable audiences disproportionally impacted. A new report by …
Evolving beyond RBAC: Why ABAC is the future
In the advent of a “work anywhere, anytime” environment, enterprises face a rapid expansion of diverse users alongside an influx of applications, devices, APIs and …
How much trust should we place in the security of biometric data?
An increasing number of people around the world are being displaced by factors such as climate change, natural disasters, and wars. The people attempting to cross …
C-level execs confident in their software supply chain security, but challenges remain
A survey of C-level executives released by CloudBees reveals high confidence levels in software supply chain security but a limited understanding of the essential components …
Ransomware attacks on the rise – How to counter them?
In June 2012, Deloitte conducted an online survey of 50 C-suite and other executives about cyber threat detection and response and found that almost 87% of the pollees …
Official (ISC)² CISSP CBK Reference: Out with the old, in with the new
Arthur Deane is a Senior Director at Capital One Financial, where he leads cybersecurity activities in the Card division. He is also the co-author of the Official (ISC)² CISSP …
Ransomware attacks on healthcare organizations may have life-or-death consequences
Ponemon Institute surveyed 597 IT and IT security professionals to understand how COVID-19 has impacted how healthcare delivery organizations (HDOs) protect patient care and …
The relationship between development and security teams affects speed to market
VMware announced findings from a study on the relationship between IT, security, and development teams as organizations adopt a zero trust security model. The study found that …
Enterprise security challenges and increased cloud usage fueled by remote work
81% of U.S.-based IT professionals believe that having remote workers has increased enterprise security challenges, while 74% acknowledge that their company’s use of cloud …
Cybersecurity posture validation: Fireside chat with Arkadiy Goykhberg, CISO of DMGT
Working in cyber security is an exciting if humbling experience. It is a discipline where you can never have enough details, best practices, and lessons learned by examining …
Proper password security falling short despite increase in online presence
While 92 percent of people know that using the same password or a variation is a risk, 65 percent still re-use passwords across accounts, drastically increasing the risks to …
Featured news
Resources
Don't miss
- Webinar: Amplifying SIEM with AI-driven NDR for IT/OT convergence
- How CISOs can elevate cybersecurity in boardroom discussions
- A humble proposal: The InfoSec CIA triad should be expanded
- Rsync vulnerabilities allow remote code execution on servers, patch quickly!
- Contextal Platform: Open-source threat detection and intelligence