How to mitigate security risks as cloud services adoption spikes
Millions have flocked to video-conferencing solutions and organizations have relied more heavily on various applications (such as G Suite for end users, Azure for developers, …
Starting your cybersecurity career path: What you need to know to be successful
As COVID-19 spread across the world, organizations found themselves more exposed to cyber threats than ever before and the cybersecurity skills gap became even more obvious. …
How do I select a SOAR solution for my business?
Security Orchestration, Automation and Response (SOAR) products offer an appealing solution, promising efficiencies in detecting and responding to threats. However, …
Security awareness programs: The difference between window dressing and behavior change
CISOs are responsible for pursuing cybersecurity purchases that align with the overall health of their organizations. All investments must drive tangible value and ROI while …
March 2021 Patch Tuesday forecast: Off to an early start
Microsoft got an early start on Patch Tuesday, releasing a series of out-of-band security updates this week to address four zero-day vulnerabilities in Exchange Server. …
Risky business: 3 timeless approaches to reduce security risk in 2021
Since the COVID-19 pandemic drove workforces home, we’ve seen an increase in security risk across the board: from an increase in phishing and spear phishing attacks to an …
Why enterprises need rugged devices with integrated endpoint management systems
The debate within business organizations of whether to use consumer devices or to invest in rugged devices for the operations side of their business is as old as personal …
U.S. municipalities are the perfect target for cybercriminals in 2021
On Feb 5th, 2021, a hacker gained remote access to a water treatment plant in Oldsmar, Florida, and was able to adjust the amount of sodium hydroxide in the water from 100 …
Chief Legal Officers face mounting compliance, privacy and cybersecurity obligations
After earning his master’s degree in computer science and working on the IT side of the business at a number of large financial services organizations, Bobby Balachandran …
Physical cyber threats: What do criminals leave when they break in?
Many organizations have maintained heavy investment in cybersecurity over the last year, even in an unpredictable time when other spending has faltered. Gartner estimates that …
How do I select a network monitoring solution for my business?
A recent report predicts that home networks, remote working software and cloud systems will be at the center of a new wave of attacks in 2021. Cybercriminals in 2021 will …
Tips for boosting the “Sec” part of DevSecOps
The most significant barrier to achieving DevSecOps is the continued perception that “Sec” is not already a part of “Dev” and “Ops”, says James Arlen, CISO at cloud data …
Featured news
Resources
Don't miss
- Deploying AI at the edge: The security trade-offs and how to manage them
- Cybercrime forums Cracked and Nulled seized, operators arrested
- SimpleHelp RMM vulnerabilities may have been exploited to breach healthcare orgs
- Zscaler CISO on balancing security and user convenience in hybrid work environments
- ExtensionHound: Open-source tool for Chrome extension DNS forensics