strategy

Ransomware attacks on the rise – How to counter them?
In June 2012, Deloitte conducted an online survey of 50 C-suite and other executives about cyber threat detection and response and found that almost 87% of the pollees …

The biggest problem with ransomware is not encryption, but credentials
With each passing day, the threat of ransomware increases in frequency, sophistication, and effectiveness. What started as a simple annoyance scheme to collect a ransom has …

3 ways any company can guard against insider threats this October
October is Cybersecurity Awareness Month, but most business leaders and consumers don’t need a special event to remember cybersecurity’s preeminence in today’s turbulent …

How to avoid the pitfalls of multi-cloud strategy deployment
Making the decision to implement a multi-cloud strategy is difficult. From the decision to pursue a multi-cloud journey to defining the requirements to laying the foundation …

Corporate attack surface exploding as a result of remote work
74% of organizations attribute recent business-impacting cyberattacks to vulnerabilities in technology put in place during the pandemic. The data is drawn from a study of more …

The evolution of DRaaS
The shift of daily production workloads from on-premises to cloud has also impacted approaches to protection of business assets and operations. When it comes to protecting …

Future of work: Cybersecurity and hybrid working as top two enterprise priorities
The pandemic has changed technology priorities for organizations worldwide finds a report from Omdia on the future of work. The top two enterprise priorities are now …

How to protect the corporate network from spyware
It used to be easy for network administrators to identify where corporate boundaries are; they were usually where the external and internal networks meet. That made it easy …

How digital transformation impacted CIO and CTO roles
Transposit announced results from a recent research study about the evolving roles of the CIO and CTO, as well as the extent of and attitudes towards adoption of DevOps …

The complexities of vulnerability remediation and proactive patching
In this interview with Help Net Security, Eran Livne, Director, Product Management, Endpoint Remediation at Qualys, discusses vulnerability remediation complexity, the …

Organizations prioritize strategic security programs, but lack fundamentals
Organizations are prioritizing strategic security programs but missing the foundational capabilities they need to make meaningful changes to their security posture, a …

Modern security strategies key to support remote workforce demands
COVID-19 quickly ushered in the era of remote work, introducing new risks that IT professionals are struggling to manage with existing security tools, according to a Thales …
Featured news
Resources
Don't miss
- Hawk Eye: Open-source scanner uncovers secrets and PII across platforms
- The Zoom attack you didn’t see coming
- Sonicwall SMA100 vulnerability exploited by attackers (CVE-2021-20035)
- The UK’s phone theft crisis is a wake-up call for digital security
- Securing digital products under the Cyber Resilience Act