strategy
The rise of the Developer Experience Engineer, and why it matters
In a world that increasingly relies on digital products, software development is becoming the catalyst for value creation and achieving top-line business results. At each …
What’s next on the agenda for Chief Compliance Officers?
As demands on the compliance function grow more intense, Chief Compliance Officers (CCOs) must proactively embrace new leadership responsibilities for their role and …
Multi-cloud environments creating additional security challenges
Tripwire announced the results of a research report that evaluated cloud security practices across enterprise environments in 2021. Conducted by Dimensional Research, the …
Rebuilding your security culture as employees return to the office
The return to work allows security teams to refocus on areas of their insider risk management program that may have been swept under the rug while working remotely. As …
Ensuring HIPAA compliance when using the cloud
Accelerated by the pandemic, health IT has continued to innovate at pace, while having to balance data protection and regulatory rules. However, critical transformations – …
54% of businesses now have a policy in place to deal with ransomware attacks
54% of businesses now have a defined policy in place to deal with ransomware attacks – whether this means paying a ransom, relying on insurance policies or refusing to pay at …
What drives SDN adoption?
U.S. enterprises are looking to software-defined networking (SDN) providers to help them increase their agility and flexibility and enable remote working after the COVID-19 …
It takes more than MFA to beat human hacking
While multi-factor authentication (MFA) is a much-needed addition to an effective cyber defense strategy, it is by no means foolproof. In fact, no single security effort can …
How Microsoft is taking cloud-powered innovation beyond Earth with Azure Space
The space community is growing rapidly and Microsoft’s Space team is developing capabilities and services to meet its needs for extended connectivity across the world, …
A more dynamic approach is needed to tackle today’s evolving cybersecurity threats
For decades, the cybersecurity industry has followed a defense-in-depth strategy, which allowed organizations to designate the battlefield against bad actors at their edge …
Understanding and stopping 5 popular cybersecurity exploitation techniques
With more than 550,000 new malware samples being discovered every day, closing the security gaps that enable these cyberthreats to access systems should be a priority for …
What you need to know about transatlantic data transfers
Where does data live and who can access it? This seemingly simple question is, in fact, incredibly complex in the cloud era, as servers often reside abroad and regional data …
Featured news
Resources
Don't miss
- What 35 years of privacy law say about the state of data protection
- 40 open-source tools redefining how security teams secure the stack
- Password habits are changing, and the data shows how far we’ve come
- Product showcase: Tuta – secure, encrypted, private email
- Henkel CISO on the messy truth of monitoring factories built across decades