Please turn on your JavaScript for this page to function normally.
medical
How to strike the balance between privacy and personalization in healthcare and beyond

The trade-off between widespread technology adoption and responsible use often lies on the spectrum of privacy. When it comes to technologies fueled by data, such as …

mind map
The rise of the Developer Experience Engineer, and why it matters

In a world that increasingly relies on digital products, software development is becoming the catalyst for value creation and achieving top-line business results. At each …

MSSP
The real cost of MSSPs not implementing new tech

Enterprises have plenty to manage as their infrastructures scale with a growing and increasingly complex cloud computing environment. They often bring in expert help to ensure …

security culture
Rebuilding your security culture as employees return to the office

The return to work allows security teams to refocus on areas of their insider risk management program that may have been swept under the rug while working remotely. As …

healthcare
Ensuring HIPAA compliance when using the cloud

Accelerated by the pandemic, health IT has continued to innovate at pace, while having to balance data protection and regulatory rules. However, critical transformations – …

user
It takes more than MFA to beat human hacking

While multi-factor authentication (MFA) is a much-needed addition to an effective cyber defense strategy, it is by no means foolproof. In fact, no single security effort can …

user
Addressing the cybersecurity skills gap: Where do we go from here?

There are an estimated 3.12 million cybersecurity jobs that need to be filled – more than double the current number of workers in this field. With this drastic gap, it is …

Shark
A more dynamic approach is needed to tackle today’s evolving cybersecurity threats

For decades, the cybersecurity industry has followed a defense-in-depth strategy, which allowed organizations to designate the battlefield against bad actors at their edge …

organize
Understanding and stopping 5 popular cybersecurity exploitation techniques

With more than 550,000 new malware samples being discovered every day, closing the security gaps that enable these cyberthreats to access systems should be a priority for …

woman
Paving the way for women in industrial cybersecurity research

The professional journey an individual takes is heavily influenced by the people they are surrounded with throughout their life. From an early age, I knew I wanted to study …

patch
July 2021 Patch Tuesday forecast: Don’t wait for Patch Tuesday

There’s been lots of excitement around the recently announced print spooler vulnerability CVE-2021-34527, commonly referred to as PrintNightmare. The excitement stems from the …

bulb
Three security lessons from a year of crisis

Crime thrives in a crisis, and the coronavirus was the largest collective emergency that the world has faced for decades. While there are more heroes than villains in the …

Don't miss

Cybersecurity news