strategy
68% of IT leaders are worried about API sprawl
Axway announced new data from its inaugural 2022 Open Everything Strategy Survey Report, which found that nearly 40% of organizations are in the process of adopting a new …
How an effective fraud prevention strategy can force fraudsters to invest more in their attacks
Since the early stages of the pandemic, account takeover fraud (ATO) has significantly transformed, quickly becoming one of the fastest-growing cybersecurity threats with 22% …
How cloud PCs act as an insurance plan for ransomware recovery
Although companies are spending billions on preventative security measures, attacks are a common occurrence. Business continuity requires enterprises to go beyond prevention …
5 free resources from the Cybersecurity and Infrastructure Security Agency (CISA)
The Cybersecurity and Infrastructure Security Agency (CISA) is an agency of the United States Department of Homeland Security. CISA is in charge of enhancing cybersecurity and …
Cybersecurity implications of using public cloud platforms
According to a recent Node4 report, IT managers have a generally positive view of public cloud platforms. Half of the respondents said that, despite benefits, they have had to …
Robotic Process Automation (RPA) adoption hindered by security concerns
Robotic Process Automation (RPA) promises numerous benefits to organizations investing in it, including increased worker productivity, the automation of tedious and monotonous …
Cloud data protection trends you need to be aware of
Veeam Software released the findings of the company’s Cloud Protection Trends Report 2023, covering four key “as a Service” scenarios: Infrastructure as a Service (IaaS), …
As trust in online spaces degrades, Canada bolsters resilience against cyber attacks
In this Help Net Security interview, Sami Khoury, Head of the Canadian Centre for Cyber Security, talks about how Canada is addressing today’s top threats, touches upon …
Creating a holistic ransomware strategy
Recent scientific research into the psychological effects of a ransomware crisis on both organizations and individuals revealed the deep marks that a ransomware crisis leaves …
Personal cybersecurity is now a company problem
As work and personal lives have almost merged into one, threat actors are increasingly targeting people because of their work lives, and cybersecurity needs to adapt to the …
Compliance initiatives can advance your organization’s security journey
Compliance standards are designed to give organizations a foundational approach to designing their security program while also reassuring third parties that you have met at …
Active security budget evaluation plugs holes in your security stack
Every successful attack has breached the security stack. Once the foundation of good cybersecurity, firewalls, and other security products are not enough to block all of the …