Please turn on your JavaScript for this page to function normally.
puzzle
3 tips for balancing data security and usability

Organizations have many challenges when it comes to cybersecurity, and one that is top of mind for many is striking the right balance between the usability of data and …

encryption
Enhancing cloud security with a two-step cryptography technique

The central goal of cloud computing is to provide fast, easy-to-use computing and data storage services at a low cost. However, the cloud environment comes with data …

XDR
XDR: Security’s new frontier

As enterprises transform their IT environment and workforce, finding the right security approach is critical for success. Without the proper protective measures in place, …

containers
Unstructured data still overshared inside and outside organizations

The number of overshared files rose 450 percent compared to the same quarter in 2020, highlighting the significant impact of the pandemic and remote work on data security. …

mobile security
Consumers neglecting mobile security despite growing number of threats

Over the past year, consumers have adapted to many changes, including the rapid shift towards a digital-first lifestyle. This has led to an emphasis on consumers dependence on …

money online
Most businesses to accelerate data security investments in 2021

71 percent of enterprise executives reported their organization’s data and AI timelines have accelerated since the onset of the COVID-19 pandemic, with one in four reporting …

biometrics
What is plaguing digital identities?

Auth0 launched a report which highlights key areas of concern for security professionals responsible for managing digital identities, including the exponential rise of …

numbers
Are your cryptographic keys truly safe? Root of Trust redefined for the cloud era

In the digital world, cryptographic solutions use encryption keys to secure data at rest, data in use, and data in transit. They are responsible for encrypting and decrypting …

vault
How to secure data one firewall at a time

The need for secure data access management is top-of-mind in the C-suite and boardroom. The question I keep hearing from IT departments is how to do it right, that is, how to …

cloud
Understanding the cloud shared responsibility model

Over the past year, we witnessed a transition to the cloud as companies had to quickly adjust to the almost instantaneous move to a remote work environment. But in many cases, …

syringe
Vaccine passports challenged by data privacy and security implications

With the ongoing distribution of COVID-19 vaccines across the globe and the broader U.S. economy preparing to reopen, the question of international travel has become a topic …

identity
Biometrics for banking and financial services market to reach $8.9 billion by 2026

The turn of next decade is expected to be more challenging for banks and financial institutions as security breaches become more sophisticated with technology advancements. …

Don't miss

Cybersecurity news