Please turn on your JavaScript for this page to function normally.
Is offensive testing the way for enterprises to finally be ahead of adversaries?

The one principle the cyber-security industry is founded on is that defenders are always a step behind the hackers. Solutions are developed (FW, AV and onwards), technologies …

danger
The dangers behind wildcard certificates: What enterprises need to know

With the National Security Agency recently issuing guidance on the risks associated with wildcard TLS certificates and Application Layer Protocols Allowing Cross-Protocol …

idea
The first step to being cybersmart: Just start somewhere

When it comes to a subject as complex as cybersecurity, it’s easy to become a victim of decision paralysis. When company leaders and IT staff begin looking at their options …

cybersecurity investments
Increased risk tolerances are making digital transformation programs vulnerable

Digital transformation programs could be vulnerable to cyber attacks due to increased risk tolerances and ongoing cybersecurity challenges, according to a global research of …

Why cybersecurity leaders should focus on spending, people and technology (in that order)

The cybersecurity industry is facing greater challenges than ever before. The number of publicly-reported data compromises continues to rise, partially due to the massive …

mobile work
Embracing secure hybrid work with four foundational IT controls

Hybrid work has become the norm for many businesses. In fact, a 2021 survey conducted by HR consulting firm Mercer found that out of a group of 510 employers with flexible …

puzzle
Business composability: Mastering the risk of accelerating change and creating new business value

Enterprises must embrace business composability to thrive through disruption in 2022 and beyond, according to Gartner’s survey of CIOs and technology executives. Business …

ransomware
Five game-changing factors for companies dealing with ransomware attacks

Continual innovation and growing sophistication of cloud services is giving organizations clear and practical routes to deal with ransomware attacks. The latest cloud-based …

analyst
Three key areas CIOs should focus on to generate value

To accelerate value creation, CIOs and IT executives should focus on three key areas – leading from anywhere, nurturing connections and reaching beyond, according to Gartner. …

attacks
Attack surface larger than ever as organizations shift to remote and hybrid work

“It was like changing an engine on a plane while it was in flight.” That’s how one security decision maker described the shift to remote work the pandemic forced last year. …

Ron Tosto
The importance of crisis management in the age of ransomware

Cybersecurity crises are becoming commonplace. With the massive surge in ransomware attacks in the last few years, businesses can’t afford to ignore the increasing …

laptop
Remote access security strategy under scrutiny as hybrid/remote working persists

A report by Menlo Security highlights growing concerns about securing users as the trend for hybrid and remote working is set to remain. The new report – which surveyed 500+ …

Don't miss

Cybersecurity news