Please turn on your JavaScript for this page to function normally.
strategy
Trends to watch when creating security strategy for the next two years

Executive performance evaluations will be increasingly linked to ability to manage cyber risk; almost one-third of nations will regulate ransomware response within the next …

idea
How companies are prioritizing infosec and compliance

New research conducted by Enterprise Management Associates (EMA), examines the impact of the compliance budget on security strategy and priorities. It describes areas for …

Door
How the blurring of the “supply chain” opens your doors to attackers—and how you can close them

There have been more than 200 dedicated supply chain attacks over the past decade. Some of these campaigns have affected countless supplier networks and millions of customers …

backup
Data recovery depends on how good your backup strategy is

99% of surveyed IT decision makers state they have backup strategies in place, but just 26% have admitted they were unable to fully restore all data/documents when recovering …

zero
Zero trust adoption: Industry-specific challenges and implementation strategies

Organizations across many industries are in the throes of a journey to implement the zero trust security model to increase their cybersecurity posture. Through my experience …

transformation
The challenges of managing increased complexity as hybrid IT accelerates

SolarWinds released the findings of its ninth annual IT Trends Report which examines the acceleration of digital transformation efforts and its impact on IT departments. The …

Code
Once is never enough: The need for continuous penetration testing

If you Google “How often should I do penetration testing?”, the first answer that pops up is “once a year.” Indeed, even industry-leading standards like PCI-DSS dictate that …

password
Strong passwords still a priority strategy for enterprises

Bitwarden announced the results of a global survey of enterprise security decision makers, conducted by 451 Research, which explores enterprise password management practices …

shield
How organizations can protect themselves in the emerging risk landscape

In this video for Help Net Security, Ravi Srinivasan, CEO of Votiro, discusses ThoughtLab’s 2022 cybersecurity benchmarking study, Cybersecurity Solutions for a Riskier …

zero
Zero trust segmentation eliminates 5 cyber disasters per year and saves $20+ million annually

Illumio released The Zero Trust Impact Report, a research on market perspectives of zero trust strategies and the business impact of segmentation technology. Conducted by The …

brain
Intelligence must drive strategic decisions

Today’s world is hyperconnected and there’s more freely available information than ever before. You would think that this would make it easier for companies to …

question
Four steps to successful empathetic investigations

How security conducts employee investigations needs to change. All too often, security investigations are an attempt to get an employee to admit to suspected wrongdoing. Times …

Don't miss

Cybersecurity news