strategy
Things to consider when selecting enterprise SSDs for critical workloads
The process of evaluating solid state drives (SSDs) for enterprise applications can present a number of challenges. You want maximum performance for the most demanding servers …
Security teams increasingly stressed due to lack of proper tools, executive support
93% of security professionals lack the tools to detect known security threats, and 92% state they are still in need of the appropriate preventative solutions to close current …
Review: Cyber Warfare – Truth, Tactics, and Strategies
Dr. Chase Cunningham holds a Ph.D. and M.S. in computer science from Colorado Technical University and a B.S. from American Military University focused on counter-terrorism …
The distinction between human and bot behavior is becoming increasingly blurred
There’s no denying that the way people have been using the Internet and online stores has changed over the last couple of months. As consumers change their online habits, the …
What is privacy and why does it matter?
Privacy is a basic right and a necessary protection in the digital age to avoid victimization and manipulation. In much of the world, privacy is considered a basic human …
It’s time to tap the next generation of cyber defenders
As college graduates of the Class of 2020 enter the workforce, we welcome a new generation of cyber professionals. Already this year’s crop of talent has demonstrated their …
Data crisis: Companies pivot from disruption to transformation
Only 10% of organizations are using data effectively for transformational purposes, according to NTT DATA Services. While 79% of organizations recognize the strategic value of …
Ransomware recovery: Moving forward without backing up
Phishing scams tied to COVID-19 show no signs of stopping. More than 3,142 phishing and counterfeit pages went live every day in January, and by March, the number had grown to …
The future of work: 74% believe they will emerge stronger
While much has been written about the immediate pandemic-related challenges, it’s important to apply the lessons learned as many prepare for the future of work. With …
Closing the skills gap can minimize the business impact of cyberattacks
CISOs who are successful at reducing or closing the critical skills gap have the highest probability of minimizing the business impact of cyberattacks – even when budgets and …
Organizations with poor privacy practices 80% more likely to suffer data breach
There’s a predictive relationship between responsible privacy practices and security outcomes, according to Osano. Companies with inadequate data privacy practices are …
How do I select a DMARC solution for my business?
Domain-based Message Authentication, Reporting & Conformance (DMARC), is an email authentication, policy, and reporting protocol. It builds on the SPF and DKIM protocols …
Featured news
Resources
Don't miss
- Poland repels data-wiping malware attack on energy systems
- Inside Microsoft’s veteran-to-tech workforce pipeline
- Brakeman: Open-source vulnerability scanner for Ruby on Rails applications
- Incident response lessons learned the hard way
- Okta users under attack: Modern phishing kits are turbocharging vishing attacks