Expert analysis

Ransomware, supply chain, and deepfakes: The top threats the finance industry needs to prepare for
The finance industry is constantly targeted by numerous threat actors, and they are always innovating and trying new techniques (such as deepfakes) to outsmart security teams …

2022 promises to be a challenging year for cybersecurity professionals
I am very glad to turn the page on 2021, however, I am not optimistic that 2022 will be remarkably better. I am hopeful that President Biden’s Executive Order 14028 and the …

Small businesses are most vulnerable to growing cybersecurity threats
Many small and medium-sized businesses (SMBs) mistakenly assume (hope?) their size makes them a less appealing target to hackers, without realizing cyber criminals are eager …

Data security in the age of insider threats: A primer
Of course, your employees are diligent, security conscious and loyal. But the real world tells a different story. A grand total of 94% of organizations had an insider data …

Eight resolutions to help navigate the new hybrid office model
Continuous review and improvement are crucial for a successful security program. As this year draws to a close, it is a good time to look back on 2021 and prepare a few …

On-premises cloud: The worst of both worlds?
As 2022 begins, the demand for cloud-fueled IT services has reached an all-time high. Given the tumult of the past two years, it’s understandable that businesses should be …

6 cloud security trends to watch for in 2022
It’s fascinating to take a step back and look at how “the cloud” developed over the last two decades. There has been a lot of innovation that has sparked a new wave of …

January 2022 Patch Tuesday forecast: Old is new again
Welcome to 2022 and a new year of patch management excitement! I’m rapidly approaching 40 years working in this industry and I can honestly say there is rarely a dull day. If …

Supply chain cybersecurity: Pain or pleasure?
Whatever sector your business operates in, you will depend on third parties to provide you with goods and services to support what you do. Whether you are a small printing …

Network and security teams must collaborate to successfully deliver digital transformation
Collaboration is a key component of any successful business strategy, but it’s not always a simple task. The conflicting goals of individual teams means that different …

Enterprise PKI automation: The modern approach to certificate lifecycle management
Today’s modern enterprises face massive surges in the use of digital identities, both for machines, (servers, laptops and network devices) and for the humans who use them. In …

Five tips on how to stay (cyber)secure in a hybrid work world
From less time spent on the commute to a better work-life balance, maintaining the newly discovered possibilities of flexible working is a firm priority for workers today. For …