Please turn on your JavaScript for this page to function normally.
find
Security research project: The easiest way to get “experience” and land a job in cybersecurity

Despite what you might have heard, there’s no shortage of people looking for jobs in cybersecurity. Every open position triggers stacks of resumes, but the challenge is …

SASE
Transitioning to a SASE architecture

There are several key points when contemplating a change in your security architecture. First, and foremost, there is still a security perimeter. The perimeter, however, is …

money
What IT leaders are prioritizing in network security investments?

Distinct priorities have emerged when it comes to responding to the needs of IT security’s rapid transformation, a Pulse Media research has found. The survey of 239 …

eye
COVID-19 creates a boom in biometric adoption

Goode Intelligence published a survey which captured the views and opinions of companies that have deployed or are thinking of deploying biometrics. COVID-19 has accelerated …

binary
Trends and technologies that are helping supply chains respond, recover and thrive during pandemic

Nearly half of supply chain leaders surveyed have dramatically accelerated spending on digital technologies to make their operations more responsive and forward-looking during …

encryption
Remote work increasing the growth rate of the EDR market

Malware and virus attacks have increased substantially over the years. With the evolution of modern technologies, the threats associated with them have also increased. But on …

lock
How micro-segmentation creates an uphill battle for intruders

The past few years have seen a major shift in security strategies from looking outward for external threats to detecting and defending against adversaries that have already …

organize
Outgunned CISOs navigate complex obstacles to keep rising attacks from turning into breaches

CISOs face a rising ‘security debt’ to secure their organizations against an increasing volume of attacks by well-armed criminals. Yet, despite going up against a criminal …

Infosecurity transformation and building proactive mitigation strategies

Marcos Christodonte II, CISO at Unqork, spent his career leading information security for large, complex enterprises. His focus on information security began when he served in …

endpoint protection
67% of IT pros concerned with teleworking endpoint misuse

43.13% of workers will stay remote after the pandemic ends and two out of three IT professionals are concerned with teleworking endpoint misuse, a new Prey study reveals. The …

keyboard
IT security teams deal with unique challenges fueled by a remote workforce

IT security teams faced unprecedented challenges last year fueled by dramatically expanded work-from-home (WFH) programs, increased BYOD policy adoptions, and rising internal …

Cybersecurity risk management
Cybersecurity only the tip of the iceberg for third-party risk management

Most companies are missing key risks at more than one stage of the vendor risk lifecycle, yet few are expanding their TPRM programs to address these risks, according to …

Don't miss

Cybersecurity news