Please turn on your JavaScript for this page to function normally.
Hands
Why companies should never hack back

After major cyberattacks on the Colonial Pipeline and on meat supplier JBS, the idea of allowing companies to launch cyberattacks back at cyber criminals was proposed. This …

Peter Broadhurst
Cyber threats, passenger vessels and superyachts: The current state of play

In this interview with Help Net Security, Peter Broadhurst, Maritime Senior VP Safety, Security, Yachting and Passenger, Inmarsat, talks about the impact of cyber threats on …

Sachin Shah
Trends in the OT/ICS security space and what’s to come

In July 2021, Armis appointed Sachin Shah, an Intel veteran of over 21 years, as its new CTO for Operational Technology (OT) and Industrial Control Systems (ICS). In this …

zero
Challenges organizations face when implementing zero trust architecture

98 percent of UK business leaders and IT decision makers either plan to or have already started implementing zero trust strategies at their organizations, according to …

network
What is driving organizations to explore emerging technologies?

Engineering trust, accelerating growth and sculpting change are the three overarching trends on the Gartner Hype Cycle for Emerging Technologies, 2021 that will drive …

Dave Wreski
How to make email safe for business

When it comes to business communication, email is still king. Cybercriminals are aware of this fact, and they’re constantly perfecting their attacks to successfully …

Microsoft 365
Why you need to make Microsoft 365 a 24/7 security priority

It’s easy to take advantage of the Microsoft 365 service, but are you taking the steps to properly secure all the data your company is storing inside of it? For security …

Ben King
Hybrid work: How do you secure every identity on your network?

As organizations around the world continue optimizing their hybrid work environments, many are struggling to stay productive without compromising on security. In this …

cloud
Things that are easy to miss in the race towards hybrid working and the cloud

The mega-trend towards hybrid working and cloud migration seems unstoppable. But customer service organizations could find their wheels come off if they fail to address a …

Work
As hybrid working arrangements remain, employers must ensure their staff works safely

Working from home has significantly increased cybersecurity vulnerabilities over the past two years, according to the world’s leading enforcement agencies. Employers must …

vault
Enterprises looking to cybersecurity providers to help protect IT systems

As enterprises in Germany digitize their operations and deal with the ongoing effects of the COVID-19 pandemic, they are looking to cybersecurity service providers to help …

cloud complexity
The 3 Rs of visibility for any cloud journey

Dealing with an incident requires not just prompt notification of the incident, but the ability to triage the cause of the incident, the ability to carry out forensics, …

Don't miss

Cybersecurity news