Expert analysis
Every business is a cybersecurity business
Hybrid working, with some staff dialing in remotely and others based in the office, forms the basis of how many organizations work, yet many businesses are still not fully …
March 2022 Patch Tuesday forecast: Pressure mounts to resolve vulnerabilities
February 2022 Patch Tuesday was an anomaly. Not only did we see record low numbers of vulnerabilities addressed across all of Microsoft’s operating systems, but we also saw …
What is Ransomware Protection as a Service?
Ransomware attacks have devastating consequences for many businesses. Those go beyond the monetary loss tied to ransom-encrypted data, and include disrupted operations, …
Why banks should incorporate software bill of materials (SBOM) into their third-party risk programs
In the face of rising cybersecurity threats, the Biden administration issued an executive order in May 2021 calling for improvements in the supply chain. Among the recommended …
Navigating data privacy in the higher education ecosystem
The need for academic institutions to become data privacy advocates is paramount. Over the past 24 months, higher education institutions have accelerated digital …
How to keep your medical device IP safe from cyber attacks
Guarding intellectual property (IP) has always been a priority for medical device manufacturers as competitors and even nation states are constantly trying to compromise or …
Apps, devices and workloads provide an ecosystem cornerstone for zero trust growth
As cybersecurity professionals, we admit it: zero trust has become the industry’s biggest buzzword. Some argue it’s a principle, others argue it’s a framework, others still …
A comparison of NDR solutions: Deep packet inspection (DPI) vs. metadata analysis
Executive summary In today’s complex IT environments, Network Detection and Response (NDR) solutions are crucial to identify, assess, and respond to cyberthreats. Many NDR …
To shift to data-driven security decision making: Start with the right data
We live in the age of data-driven everything. From sales to operations, and everything in-between, today’s organizations are constantly looking for ways to leverage the data …
Tackling supply chain security head-on
Threats against supply chains are growing and the reality is that the size, cost, and sophistication of these threats make it difficult for anyone organization to control or …
Supply chain shortages create a cybersecurity nightmare
The White House has recently issued alerts noting that many manufacturers suffer from disrupted supply chains, and rebuilding supply chains is a major priority. Some analysts …
Securing IoT from the ground up
We live in a highly connected world. There are already approximately 10 billion connected Internet of Things (IoT) devices, and their number is expected to grow to over 25 …
Featured news
Sponsored
Don't miss
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints