Please turn on your JavaScript for this page to function normally.
puzzle
Preparing for the Cybersecurity Maturity Model Certification onslaught

For the Defense Industrial Base (DIB), the Department of Defense (DoD) Cybersecurity Maturity Model Certification (CMMC) compliance requirement is the hot news topic of 2021. …

tools
Protecting the digital workplace with an integrated security strategy

COVID-19 propelled the world of IT years into the future. Organizations considering long-term digital transformation plans were abruptly forced to accelerate their timeline, …

search
Closing the data divide: How to create harmony among data scientists and privacy advocates

Balancing data privacy within an organization is no easy task, particularly for data scientists who need quick access to data, and security and governance teams whose job it …

email
The rise of non-English language spear phishing emails

Business email compromise (BEC) threats are one of the many tried-and-tested tactics cybercriminals use to target their victims. These tend to be brief messages with only a …

architecture
Why enterprises need rugged devices with integrated endpoint management systems

The debate within business organizations of whether to use consumer devices or to invest in rugged devices for the operations side of their business is as old as personal …

identity
Five factors driving investment in IDV

For billions of individuals around the world, digital identity became critical in 2020. As a result, the global identity verification market, which was already growing rapidly …

2021 will be the year of hybrid working: How can CTOs keep staff secure and productive?

In 2020, the pandemic was a radical turning point in the way we work. Office workers were forced to give up their commute and work from home. People from a whole range of …

template
Third-party risk management programs still largely a checkbox exercise

Enterprise third-party risk management (TPRM) programs have been around for a half-decade or longer, and at this point most large organizations run one. However, many of these …

target
U.S. municipalities are the perfect target for cybercriminals in 2021

On Feb 5th, 2021, a hacker gained remote access to a water treatment plant in Oldsmar, Florida, and was able to adjust the amount of sodium hydroxide in the water from 100 …

Eyes
Physical cyber threats: What do criminals leave when they break in? 

Many organizations have maintained heavy investment in cybersecurity over the last year, even in an unpredictable time when other spending has faltered. Gartner estimates that …

data
Database encryption: Protecting the crown jewels

Databases are the lifeblood store of information for every organization. Without them, the organization’s efficiency, productivity and scope to prosper would be curtailed …

Mask
10 COVID-19-related lessons for future-ready cybersecurity

In 2020, we experienced wave after wave of COVID-19 surges and watched failure after failure at practicing what we knew were effective preventative measures. Similarly, in …

Don't miss

Cybersecurity news