Please turn on your JavaScript for this page to function normally.
vault
How to secure data one firewall at a time

The need for secure data access management is top-of-mind in the C-suite and boardroom. The question I keep hearing from IT departments is how to do it right, that is, how to …

cloud
Understanding the cloud shared responsibility model

Over the past year, we witnessed a transition to the cloud as companies had to quickly adjust to the almost instantaneous move to a remote work environment. But in many cases, …

businessman
To identify cybersecurity vendor sustainability, start with the fundamentals

With $3.7 billion raised in cybersecurity funding so far this year, 2021 is on track to overcome last year’s record $7.8 billion total. Many of these companies have very high …

Hand
Why XSS is still an XXL issue in 2021

Cross-site scripting (XSS) attacks take advantage of coding flaws in the way websites or web applications generate input from users. Despite their longstanding reputation as a …

secure
Are your cyber defenses stuck in the sandbox?

Installing a network sandbox to safeguard against external threats has been accepted by many as the gold standard for more than a decade. Sandbox-based cybersecurity solutions …

cloud
Investing in the right future for the cloud

In the last decade we have seen cloud technology evolve from a useful competitive business tool to one of the key foundations of the business world. Migrating assets, …

Door
Quantum computing is imminent, and enterprises need crypto agility now

Nearly 100 years ago, the first quantum revolution ushered in the technological advances that have made our modern life possible. Advances in quantum physics led to the …

USA
The future of FISA

News that court-approved Foreign Intelligence Surveillance Act (FISA) searches dropped to new lows in 2020 hit the papers recently, and it raised some eyebrows as well as …

syringe
Digital criminals turn toward vaccines to capitalize on COVID-19

Cybercriminals continue to capitalize on the hysteria and worry caused by COVID-19, both in the physical sphere and digital ecosystem, exploiting the significant global unmet …

risk
Mitigating third-party risks with effective cyber risk management

Third-party engagement has steadily become an essential part of business operations for many organizations, enlisted for all kinds of products and services across nearly all …

zero trust
The 6 steps to implementing zero trust

More often than not, organizations see zero trust as being an all or nothing proposition, where benefits will only be realized once everything in the system has been …

lock
Enhancing cyber resilience: What your team needs to know

In the wake of malicious attacks, we often witness everyone focusing on searching for those responsible, as opposed to how or why the attack took place and the most critical …

Don't miss

Cybersecurity news