strategy

Digital privacy: A double-edged sword
Digital privacy is paramount to the global community, but it must be balanced against the proliferation of digital-first crimes, including child sexual abuse, human …

Everyone’s talking about microservices, who’s actually doing it?
77% of organizations have adopted microservices, with 92% experiencing success with microservices, according to an O’Reilly survey. Teams who own the software lifecycle …

Digital transformation: Affected and accelerated by COVID-19
97% of enterprise decision makers believe COVID-19 accelerated their company’s digital transformation efforts, according to a Twilio survey of over 2,500 enterprise decision …

Infosec is a mindset as well as a job, but burnout can happen to anyone
Time and again (and again), survey results tell us that many cybersecurity professionals are close to burnout and are considering quitting their jobs or even leaving the …

Cloud services help adapt and respond to COVID-19 challenges
38 percent of businesses have scaled infrastructure to meet new levels of demand during the lockdown period (March-June), highlighting how the pandemic has accelerated …

A look at modern adversary behavior and the usage of open source tools in the enterprise
Leszek Miś is the founder of Defensive Security, a principal trainer and security researcher with over 15 years of experience. Next week, he’s running an amazing online …

Businesses express concerns around ethical risks for their AI initiatives
Businesses are entering a new chapter in AI implementation where early adopters may have to work harder to preserve an edge over their industry peers, according to Deloitte. …

Is DNS a vital component of your security strategy?
Security and risk (S&R) teams often use DNS to detect and block threats early in the kill chain, identify compromised devices, and investigate and respond to malware, an …

How do I select a network detection and response solution for my business?
Network detection and response (NDR) solutions enable organizations to improve their threat response, they help protect against a variety of threats, and also provide …

The crypto-agility mandate, and how to get there
To achieve long-term data protection in today’s fast-changing and uncertain world, companies need the ability to respond quickly to unforeseen events. Threats like quantum …

Cyberwarfare: The changing role of force
Novel malware, computer code and clandestine digital access are some of the unconventional weapons various countries are currently amassing and deploying. Whether used as a …

An effective cloud security posture begins with these three steps
Public cloud adoption continues to surge, with roughly 83% of all enterprise workloads expected to be in the cloud by the end of the year. The added flexibility and lower …
Featured news
Resources
Don't miss
- Hawk Eye: Open-source scanner uncovers secrets and PII across platforms
- The Zoom attack you didn’t see coming
- Sonicwall SMA100 vulnerability exploited by attackers (CVE-2021-20035)
- The UK’s phone theft crisis is a wake-up call for digital security
- Securing digital products under the Cyber Resilience Act