Please turn on your JavaScript for this page to function normally.
arrows
Risky business: 3 timeless approaches to reduce security risk in 2021

Since the COVID-19 pandemic drove workforces home, we’ve seen an increase in security risk across the board: from an increase in phishing and spear phishing attacks to an …

architecture
Why enterprises need rugged devices with integrated endpoint management systems

The debate within business organizations of whether to use consumer devices or to invest in rugged devices for the operations side of their business is as old as personal …

target
U.S. municipalities are the perfect target for cybercriminals in 2021

On Feb 5th, 2021, a hacker gained remote access to a water treatment plant in Oldsmar, Florida, and was able to adjust the amount of sodium hydroxide in the water from 100 …

lock
Chief Legal Officers face mounting compliance, privacy and cybersecurity obligations

After earning his master’s degree in computer science and working on the IT side of the business at a number of large financial services organizations, Bobby Balachandran …

Eyes
Physical cyber threats: What do criminals leave when they break in? 

Many organizations have maintained heavy investment in cybersecurity over the last year, even in an unpredictable time when other spending has faltered. Gartner estimates that …

network monitoring
How do I select a network monitoring solution for my business?

A recent report predicts that home networks, remote working software and cloud systems will be at the center of a new wave of attacks in 2021. Cybercriminals in 2021 will …

DevSecOps
Tips for boosting the “Sec” part of DevSecOps

The most significant barrier to achieving DevSecOps is the continued perception that “Sec” is not already a part of “Dev” and “Ops”, says James Arlen, CISO at cloud data …

identity theft
Can we put a stop to cyber harassment?

Cyber harassment via social networks, media, and other online channels is an everyday reality for too many people, and the problem is getting worse. It might seem inevitable, …

data
Data loss prevention strategies for long-term remote teams

Before the recent pandemic, many executives began appreciating the risks and opportunities associated with cybersecurity. A 2019 survey on cybersecurity priorities from Optiv …

puzzle
Kick off the year with a new vendor management spring cleaning strategy

Your company’s vendor management program may not be what you need to get the most out of your cybersecurity vendors, so I’ll focus on a Cyber Vendor Optimization Strategy. The …

ransomware
Ransomware: The rise of Misfortune 500 businesses

Far too many executives and employees think ransomware is a nuisance delivered via an obviously fake phishing email. This misconception leaves companies exposed to attack. …

cybersecurity marketing
Cybersecurity marketing: Always think of the customer

In early January, LogMeIn announced that Jamie Domenici will join the company as its new Chief Marketing Officer. Domenici is a cloud marketing veteran, and the majority of …

Don't miss

Cybersecurity news