Please turn on your JavaScript for this page to function normally.
Think
The dangers of assumptions in security

Assuming things is bad for your security posture. You are leaving yourself vulnerable when you assume what you have is what you need, or what you have is working as …

compliance
GDPR, CCPA and beyond: How synthetic data can reduce the scope of stringent regulations

As many organizations are still discovering, compliance is complicated. Stringent regulations, like the GDPR and the CCPA, require multiple steps from numerous departments …

cloud
Shift to work-from-home: Most IT pros worried about cloud security

As most companies make the rapid shift to work-from-home to stem the spread of COVID-19, a significant percentage of IT and cloud professionals are concerned about maintaining …

talk
A worrisome increase in call traffic from fraudsters exploiting the pandemic

There’s a worrisome increase in call traffic from bad actors looking to cash in on new vulnerabilities created by the global COVID-19 pandemic, according to research …

laptop
When your laptop is your workspace, the real office never closes

With the COVID-19 pandemic, working from home has moved from a company perk to a hard requirement. Social distancing government mandates have forced complete office closures …

mobile work
Small businesses unprepared for remote working, most don’t provide cybersecurity training

Stay-at-home orders for more than 40 states have forced millions of businesses to establish remote workforces that rely solely on internet-enabled applications and products to …

cloud
You have to consider cybersecurity at all points of a cloud migration

Human error and complex cloud deployments open the door to a wide range of cyber threats, according to Trend Micro. Cloud security issues Gartner predicts that by 2021, over …

PKI
10 considerations in order to ensure business continuity for PKI

Every year, enterprises face unforeseen events that can disrupt operations. These events are rarely predictable and often create significant challenges for IT and security …

cloud storage
Enterprises regard the cloud as critical for innovation, but struggle with security

Most enterprises (85%) believe embracing the public cloud is critical to fuel innovation, but the majority are not equipped to operate in the cloud securely, according to a …

shark
Know thy enemy: The evolving behaviors of today’s cybercriminals

Organizations in the energy/utilities, government, manufacturing, and healthcare sectors have witnessed an increase in cyberattacks over the past year. In fact, recent …

question
What do CISOs want from cybersecurity vendors right now?

As COVID-19 spreads across the globe, what challenges are CISOs and other cybersecurity executives dealing with and what things they don’t want to be dealing with at the …

stop
Third-party risk is broken, businesses unprepared for supply chain disruptions

Many companies are not dedicating proper resources to assess third-party risks, and those that are still lack confidence in their programs, according to Prevalent. Supply …

Don't miss

Cybersecurity news