strategy
To shift to data-driven security decision making: Start with the right data
We live in the age of data-driven everything. From sales to operations, and everything in-between, today’s organizations are constantly looking for ways to leverage the data …
Tackling supply chain security head-on
Threats against supply chains are growing and the reality is that the size, cost, and sophistication of these threats make it difficult for anyone organization to control or …
Securing IoT from the ground up
We live in a highly connected world. There are already approximately 10 billion connected Internet of Things (IoT) devices, and their number is expected to grow to over 25 …
The importance of implementing a zero trust strategy
Optiv has published a report based on a recent survey of cybersecurity leaders that highlights the critical importance of implementing zero trust as an effective way to reduce …
Democratizing security with Open XDR
There is no denying the notion of strength in unity. Similarly, inclusiveness and the broad participation of many is another idea that is widely cherished. These are both …
Why the C-suite should focus on understanding cybersecurity and investing appropriately
Trend Micro has published a research revealing that persistently low IT/C-suite engagement may imperil investments and expose organizations to increased cyber risk. Over 90% …
Zero trust adoption will continue to mature
Illumio released findings of a study conducted by Forrester Consulting that explore how organizations are approaching their zero trust strategies in 2022 to better navigate …
Why security strategies need a new perspective
After a stream of ransomware campaigns, data leaks, and attacks on critical infrastructure, businesses understand their digitization strategy needs to be complemented by a …
78% of organizations expect to produce or consume SBOMs in 2022
The Linux Foundation announced the availability of the first in a series of research projects to understand the challenges and opportunities for securing software supply …
Organizations still struggling to use APIs effectively
APIs continue to grow in importance not only with software developers but also with the leading enterprise organizations they support, as companies increasingly rely on APIs …
3 key elements of a strong cybersecurity program
The world relies on technology. So, a strong cybersecurity program is more important than ever. The challenge of achieving good cyber hygiene can be especially acute for …
Most breaches largely caused by staff working from home
Diligent announces a survey of 450 senior finance and risk professionals in UK-listed businesses. The results show that UK businesses lost £374 million in 2021, largely due to …
Featured news
Resources
Don't miss
- Banshee Stealer variant targets Russian-speaking macOS users
- Ivanti Connect Secure zero-day exploited since mid-December (CVE-2025-0282)
- GitLab CISO on proactive monitoring and metrics for DevSecOps success
- Sara: Open-source RouterOS security inspector
- Cybersecurity in 2025: Global conflict, grown-up AI, and the wisdom of the crowd