strategy
Strong security starts with the strengthening of the weakest link: passwords
Darren Siegel is a cyber security expert at Specops Software. He works as a lead IT engineer, helping organizations solve complex challenges within IT security. In this …
The future of security protocols for remote work
Cybercrime has been growing rapidly for years, and the sudden pandemic-fueled shift to work from home (WFH) only accelerated the threat, forcing businesses to start putting a …
The public sector is more concerned about external than internal threats
SolarWinds announced the findings of its Public Sector Cybersecurity Survey Report. This survey includes responses from 400 IT operations and security decision makers, …
Eight resolutions to help navigate the new hybrid office model
Continuous review and improvement are crucial for a successful security program. As this year draws to a close, it is a good time to look back on 2021 and prepare a few …
Network and security teams must collaborate to successfully deliver digital transformation
Collaboration is a key component of any successful business strategy, but it’s not always a simple task. The conflicting goals of individual teams means that different …
Bridging the “front and back of the house”: A lesson in risk management
Between cloud proliferation, new tech infrastructure and tools and an increasingly distributed workforce, organizations are struggling to implement proper risk management …
API security: Understanding the next top attack vector
Application Programming Interfaces (APIs) underpin today’s digital ecosystem as the essential connective tissue that allows companies to exchange data and information quickly …
How companies manage data and AI initiatives
NewVantage Partners has released the results of its annual Data and AI Leadership Executive Survey. In the Foreword to this year’s survey, NewVantage Partners CEO Randy Bean, …
Should businesses be concerned about APT-style attacks?
As we enter 2022, organizations are re-evaluating their cybersecurity strategies to lower risks and best defend against potential threats. Through budget, risk tolerance, …
Preventing document fraud in a world built on digital trust
All digital markets are built on trust and that trust has been reduced to an algorithm driven by proof of identity, which currently remains heavily reliant on formal documents …
Supply chains, ransomware, zero trust and other security predictions for 2022
As 2021 draws to a close, no one in their right mind thinks that cybersecurity risk is just someone else’s problem anymore; major cybersecurity incidents like the SolarWinds …
It’s time for a unified approach to securing data, applications, and the edge
Organizations usually manage the security of data, applications and edge computing from disparate technologies and across different teams. That traditional approach will not …
Featured news
Sponsored
Don't miss
- How to recognize employment fraud before it becomes a security issue
- Practical strategies to build an inclusive culture in cybersecurity
- Domain security posture of Forbes Global 2000 companies
- Faraway Russian hackers breached US organization via Wi-Fi
- Microsoft asks Windows Insiders to try out the controversial Recall feature