strategy
Things that are easy to miss in the race towards hybrid working and the cloud
The mega-trend towards hybrid working and cloud migration seems unstoppable. But customer service organizations could find their wheels come off if they fail to address a …
As hybrid working arrangements remain, employers must ensure their staff works safely
Working from home has significantly increased cybersecurity vulnerabilities over the past two years, according to the world’s leading enforcement agencies. Employers must …
Enterprises looking to cybersecurity providers to help protect IT systems
As enterprises in Germany digitize their operations and deal with the ongoing effects of the COVID-19 pandemic, they are looking to cybersecurity service providers to help …
The 3 Rs of visibility for any cloud journey
Dealing with an incident requires not just prompt notification of the incident, but the ability to triage the cause of the incident, the ability to carry out forensics, …
Cybersecurity is top priority for enterprises as they shift to digital-first operating models
90% of enterprises are yet to achieve their digital-first goals with 49% admitting that cybersecurity is the top most priority for their business, a Tata Communications report …
How building a world class SOC can alleviate security team burnout
For security leaders, building a mature Security Operations Center is about establishing robust processes that bring teams and technology together for success. Yet many SOC …
Where do we stand when it comes to multi-cloud maturity?
Most IT leaders agree their future-state IT landscape will be a multi-cloud environment. Figuring out how to achieve that will take some time. In this interview with Help Net …
ESG regulatory requirements present risk but also opportunities
Regulatory risk related to environmental, social and governance (ESG) disclosures has rapidly risen to the second overall position in Gartner’s latest report. ESG regulatory …
How to foster collaboration with the IT team for a successful zero trust implementation
The conversation surrounding deploying a zero trust strategy continues to gain importance following the announcement of President Biden’s recent Executive Order, which …
Demand for data is growing, but so are data supply chain challenges
Data suppliers are unable to efficiently deliver relevant data to a growing number of data consumers, according to a 451 Research survey. 55% of those surveyed report that …
Stop the breaches! Four steps to minimize security risks
Ransomware, mobile phone hacks, and other cyber-attacks are an everyday occurrence, making cybersecurity one of the most pressing concerns for companies around the world. …
50% of cybersecurity attacks are from repeat offenders
Lack of awareness and gaps in knowledge are a weak link for cybersecurity leadership who are responsible for strategic planning of cybersecurity defenses, leaving …
Featured news
Resources
Don't miss
- Banshee Stealer variant targets Russian-speaking macOS users
- Ivanti Connect Secure zero-day exploited since mid-December (CVE-2025-0282)
- GitLab CISO on proactive monitoring and metrics for DevSecOps success
- Sara: Open-source RouterOS security inspector
- Cybersecurity in 2025: Global conflict, grown-up AI, and the wisdom of the crowd