cybersecurity
Out with the old, in with the new: From VPNs to ZTNA
The VPN held an important role in the evolution of the internet, and for decades has supported businesses in securing their networks. VPNs have been used by businesses and …
Increasing number of investigations calls for advanced technology and dedicated teams
Compliance Week conducted a survey which shows the importance of both advanced technology and dedicated teams that can quickly deliver data insights to reduce time and cost …
Why should enterprises invest in machine identity management tools?
More than 60% of organizations don’t hold full awareness of certificates and keys across their digital assets, according to a research from AppViewX. Over the course of …
Critical infrastructure today: Complex challenges and rising threats
Cyber attacks against critical national infrastructure are escalating. The ransomware hit on Colonial Pipeline was a clanging wake-up call for the public, but cybersecurity …
Previous employees with access to corporate data remain a threat to businesses
Offboarding employees securely is a key problem for business leaders, with 40% concerned that employees who leave a company retain knowledge of passwords that grant access to …
The cybersecurity of industrial companies remains low, potential damage can be severe
Positive Technologies released a research that examines information security risks present in industrial companies, the second-most targeted sector by cybercriminals in 2020. …
Using zero trust to mitigate 5G security challenges
The total number of 5G connections will reach 3.2 billion by 2026, rising from 310 million in 2021, a study from Juniper Research has found. 45% of operators consider it …
Finding and using the right cybersecurity incident response tools
Unpacking the layers of a cyberattack is rarely a simple task. You need to analyze many potential entry points, attack paths, and data exfiltration tactics to reveal the scope …
The cybersecurity metrics required to make Biden’s Executive Order impactful
For too long, both the private and public sectors have not prioritized cybersecurity efforts enough and only acted in “good faith” – an inadequate effort to improve …
Getting ahead of a major blind spot for CISOs: Third-party risk
For many CISOs and security leaders, it was not long ago that their remit focused on the networks and digital ecosystems for their organization alone. In today’s digital …
New standard enhances the cybersecurity of pipeline control systems
The American Petroleum Institute (API) published its 3rd Edition of Standard (Std) 1164, Pipeline Control Systems Cybersecurity, underscoring the natural gas and oil …
Hybrid work is here to stay, but security concerns are high
As a rise in variants spurs new uncertainties around the COVID-19 pandemic, businesses around the globe are tasked with developing a long-term plan and work model, whether …
Featured news
Resources
Don't miss
- Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them?
- New UEFI Secure Boot bypass vulnerability discovered (CVE-2024-7344)
- Webinar: Amplifying SIEM with AI-driven NDR for IT/OT convergence
- How CISOs can elevate cybersecurity in boardroom discussions
- A humble proposal: The InfoSec CIA triad should be expanded