Please turn on your JavaScript for this page to function normally.
Healthcare IoT
What is the HIPAA Security Rule? Three safeguards to have in place

The past year has catalyzed a new era of healthcare, one where telehealth visits increased as we relied on online communication to keep ourselves informed and healthy. With …

tools
Why automated pentesting won’t fix the cybersecurity skills gap

The modern threat landscape is an enormous challenge for the modern enterprise. Many organizations are “addressing” this by buying the newest security products from the latest …

cloud
Things that are easy to miss in the race towards hybrid working and the cloud

The mega-trend towards hybrid working and cloud migration seems unstoppable. But customer service organizations could find their wheels come off if they fail to address a …

identity theft
The warning signs of burnout and how to deal with it

It’s easy for information security professionals to feel burnt out. From the constant stream of security alerts to the demands of senior management, it can be tempting …

zero
Zero trust network access: A safe journey to a better employee experience

Trust is a foundational element of society. When engaging in any social or commercial interaction, we need to be able to trust the people we deal with. And yet, one of …

cloud complexity
The 3 Rs of visibility for any cloud journey

Dealing with an incident requires not just prompt notification of the incident, but the ability to triage the cause of the incident, the ability to carry out forensics, …

critical infrastructure
Collaboration is the key to protecting critical national infrastructure

Concern around protecting critical national infrastructure (CNI) is growing. Following several high-profile attacks and growing tensions around state sponsored cyber activity, …

drown
How building a world class SOC can alleviate security team burnout 

For security leaders, building a mature Security Operations Center is about establishing robust processes that bring teams and technology together for success. Yet many SOC …

zero
How to foster collaboration with the IT team for a successful zero trust implementation

The conversation surrounding deploying a zero trust strategy continues to gain importance following the announcement of President Biden’s recent Executive Order, which …

zero
Even the US president wants zero trust: Here’s how to make it a reality

President Biden’s executive order on improving the nation’s cybersecurity requires agency heads to develop a plan to implement a zero-trust architecture to effectively …

arrows
Stop the breaches! Four steps to minimize security risks

Ransomware, mobile phone hacks, and other cyber-attacks are an everyday occurrence, making cybersecurity one of the most pressing concerns for companies around the world. …

Apple
How to prepare for Apple’s Mail Privacy Protection

Over the last few years, consumers began to be more concerned and have greater understanding of the importance of privacy. In a recent survey conducted by Statista, over half …

Don't miss

Cybersecurity news