strategy
Three reasons why context is key to narrowing your attack surface
2020 has been a year of radical change for cybersecurity. Lockdowns forced businesses to find new ways to maintain continuity. As a result, digital transformation initiatives …
CFOs optimistic, expect the economy to improve in 2021
Each quarter, Deloitte tracks the thinking and actions of leading CFOs representing North America’s largest and most influential companies. Participating CFOs represent …
SolarWinds is the tip of the iceberg
The recent SolarWinds software supply chain breach is a clear indication that strong OT cybersecurity is a must-have in today’s threat environment. Waterfall’s technologies …
How do I select a data control solution for my business?
Data transparency allows people to know what personal data has been collected, what data an organization wants to collect and how it will be used. Data control provides the …
Healthcare organizations to increase hybrid cloud deployments
Nutanix announced the healthcare industry findings of its report, measuring healthcare organizations’ plans for adopting private, hybrid and public clouds. The findings point …
Expedited shifts to hybrid infrastructure and remote work challenges
There was a significant acceleration of cloud and colocation migrations, with 54 percent of IT leaders stating the pandemic has motivated their organization to move …
Stress levels are rising, but that doesn’t have to mean more security incidents
For those working remotely during the pandemic, changes to how work is done have significantly increased stress levels – and when we’re stressed, we’re more likely to make …
Countries that retaliate too much against cyberattacks make things worse for themselves
During the opening ceremonies of the 2018 Winter Olympics, held in PyeongChang, South Korea, Russian hackers launched a cyberattack that disrupted television and internet …
42% of security leaders said the pandemic has changed their cybersecurity priorities
Fudo Security published the results of it survey, enlisting the unique perspectives of a diverse, select group of CISOs, senior cybersecurity executives and industry …
Three signs your SOC is ready for XDR
Over the past year, there’s been a movement growing in the industry towards Extended Detection and Response, or XDR. While a few offerings represent broad portfolio …
What’s at stake in the Computer Fraud and Abuse Act (CFAA)
Two weeks ago, the Supreme Court heard oral arguments in Van Buren vs. United States, the landmark case over the Computer Fraud and Abuse Act (CFAA). Nathan Van Buren, the …
Most IT decision makers don’t trust data, but 54% still use it to make decisions
77% of IT decision makers (ITDMs) don’t completely trust the data within their organization for timely and accurate decision making, according to SnapLogic. With 98% of those …
Featured news
Sponsored
Don't miss
- Black Friday shoppers targeted with thousands of fraudulent online stores
- RomCom hackers chained Firefox and Windows zero-days to deliver backdoor
- How to recognize employment fraud before it becomes a security issue
- Practical strategies to build an inclusive culture in cybersecurity
- Domain security posture of Forbes Global 2000 companies