Please turn on your JavaScript for this page to function normally.
attacks
Surge in cyber attacks confirms the need for zero trust security

Zscaler announced the release of a report that tracked and analyzed over 20 billion threats blocked over HTTPS, a protocol originally designed for secure communication over …

flame
Despite increased cyber threats, many organizations have no defense plans in place

98% of U.S. executives report that their organizations experienced at least one cyber event in the past year, compared to a slightly lower rate of 84% in non-U.S. executives, …

zero trust
Four key tenets of zero trust security

As cybercrime threatens businesses of all sizes, industries and locations, organizations have realized that the status quo is no longer tenable and that implementing zero …

zero
Network and IoT security in a zero trust security model

You can never be too careful when it comes to network and IoT security. With a rapidly growing number of disparate devices being connected to corporate and industrial …

organize
Security leaders facing challenges in managing and securing distributed work environments

Absolute Software announced new insights into how organizations are rethinking and rebuilding their operating models after more than 18 months of remote work forced massive …

IoT
Security changes needed to protect corporate networks from non-business IoT devices

Cyber adversaries know that one small IoT sensor can provide entry into a corporate network to launch ransomware attacks and more. According to a survey of IT decision-makers …

zero trust
Analyzing and implementing a national zero trust architecture

This October, we once again find ourselves observing National Cybersecurity Awareness Month. While this effort traditionally targets consumers and businesses, the U.S. …

laptop
Remote access security strategy under scrutiny as hybrid/remote working persists

A report by Menlo Security highlights growing concerns about securing users as the trend for hybrid and remote working is set to remain. The new report – which surveyed 500+ …

passwordless
IT leaders confident in their organization’s network security, IT managers have doubts

While IT leaders believe they have strong security practices in place, their continual search for additional network security capabilities suggests that this confidence may be …

chess
The cybersecurity issues organizations deal with remain complex and numerous

New thinking on cybersecurity policies, processes, people and products are necessary for organizations to reverse perceptions, and perhaps realities, that they are falling …

arrows
Evolving beyond RBAC: Why ABAC is the future

In the advent of a “work anywhere, anytime” environment, enterprises face a rapid expansion of diverse users alongside an influx of applications, devices, APIs and …

person
The relationship between development and security teams affects speed to market

VMware announced findings from a study on the relationship between IT, security, and development teams as organizations adopt a zero trust security model. The study found that …

Don't miss

Cybersecurity news