Please turn on your JavaScript for this page to function normally.
identity theft
Preventing document fraud in a world built on digital trust

All digital markets are built on trust and that trust has been reduced to an algorithm driven by proof of identity, which currently remains heavily reliant on formal documents …

businessman
A CISO’s guide to discussing cybersecurity with the board

With data breaches on track to reach all-time high, chief information security officers (CISOs) are on alert to find blind spots in IT infrastructures and mitigate risks to …

energy
Why the UK’s energy sector is fragile and ripe to cyber attacks

For the first time in a generation, the UK is in the middle of an unprecedented supply chain crisis, and in recent weeks, we have seen very clearly the immediate and …

2022
Supply chains, ransomware, zero trust and other security predictions for 2022

As 2021 draws to a close, no one in their right mind thinks that cybersecurity risk is just someone else’s problem anymore; major cybersecurity incidents like the SolarWinds …

hands
It’s time for a unified approach to securing data, applications, and the edge

Organizations usually manage the security of data, applications and edge computing from disparate technologies and across different teams. That traditional approach will not …

professional
When employees leave, is your data walking out the door?

In the second quarter of 2021, American workers began resigning from their jobs at a historic rate. The “Great Resignation”, as it’s since been dubbed, has seen the U.S. set …

2022
How will the cybersecurity industry evolve in 2022?

The cybersecurity landscape has always been dynamic. However, this past year highlighted vulnerabilities and attack vectors that will drive trends and shape global …

Log4j
4 practical strategies for Log4j discovery

For security teams scrambling to secure their organizations against Log4j exploitation, one of the first and most challenging tasks is understanding where Log4j exists within …

gift
How to avoid “festive fraud” during the holiday season

The year-end holiday season is a time for celebration – a chance to decorate homes, splurge on gifts and gather with family and friends. It’s also a time when the scammers …

ecommerce
The retail sector needs to know when and not if it will be hacked

This year, major chains like Target and Walmart closed on Thanksgiving, which resulted in a 90.4 percent dip in visits to brick-and-mortar stores when compared to 2019. This …

Log4j
Log4Shell is a dumpster fire that should have been avoided

On Thursday, December 9, 2021, my young, Minecraft-addicted kids were still completely oblivious of the Log4j vulnerabilities in their favorite game. Then again, so was every …

2022
Five cybersecurity predictions for 2022 and beyond

2021 saw some of the largest and most influential cyber attacks to date. Leaders in cybersecurity have faced numerous challenges this year and are likely to experience …

Don't miss

Cybersecurity news