strategy

The importance of compute lifecycle assurance in a zero-trust world
With the proliferation of attack surfaces in IoT, the increase in firmware-based attacks on hardware, and growing threats to systems throughout their lifecycle, companies are …

With Crime-as-a-Service, anyone can be an attacker
Crime-as-a-Service (CaaS) is the practice of experienced cybercriminals selling access to the tools and knowledge needed to execute cybercrime – in particular, it’s often used …

Gamification can redefine the cybersecurity demo experience
Lead generation is the easy part of the sales cycle. Marketing activities, sales enablement tools, events, and so on should create the perfect environment that allows sales …

A digital shift requires a new approach to asset management: How to reduce security risks
The global pandemic forced organizations to rapidly accelerate their digital transformation. As a result, nearly overnight, companies spanning all sizes and sectors deployed …

Organizations still rely on weak security for remote workers
A new survey of enterprise IT security leaders showed almost 80 percent believe remote workers are at more risk for phishing attacks now because they’re isolated from …

Engaging with governments is a data security priority
Global tax systems are responsible for handling and storing vast amounts of data. Whether it’s details of a supplier’s transactions with its customers, or personal financial …

What should IT leaders look for in an SD-WAN solution?
The phrase “game-changing” has become almost overused in recent years, particularly in the world of tech. To an extent, this reflects the degree of constant innovation taking …

Curious to see how healthcare cybersecurity fared this year?
Most hospitals critically lack the ability to secure their supply chain systems, according to CynergisTek. In a new report, CynergisTek reviewed just under 100 assessments of …

How can secure KVM technology help eliminate security risks?
John Minasyan leads Belkin’s cybersecurity business unit focused on solutions to mitigate advanced threats at an operator’s desk. In this conversation with Help Net Security, …

Average total cost of a data breach increased by nearly 10% year over year
Data breaches now cost companies a total of $4.24 million per incident on average, according to the Cost of a Data Breach Report, conducted by Ponemon Institute and analyzed …

Competition main force behind increased cloud migration
Organizations are moving to the cloud in big numbers to drive competitive strategies and provide richer customer experiences, according to Next Pathway. This is a shift from …

Critical infrastructure pain points: The toughest challenges
Accenture Federal Services recently hired cybersecurity expert and former CISA executive, Rick Driggers. He brings more than 30 years of federal government and military …
Featured news
Resources
Don't miss
- Where policy meets profit: Navigating the new frontier of defense tech startups
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground
- Open source has a malware problem, and it’s getting worse