Please turn on your JavaScript for this page to function normally.
Develop a cybersecurity team
How to develop a skilled cybersecurity team

What skills should aspiring information security workers possess and work on? What certifications can come in handy more than others? What strategies should organizations …

lock
How do I select a data recovery solution for my business?

Ransomware attacks have been hitting hard lately, with over half of organizations experiencing at least one this year, according to a recent study. Recovering data often means …

Chris Audet
What’s next on the agenda for Chief Compliance Officers?

As demands on the compliance function grow more intense, Chief Compliance Officers (CCOs) must proactively embrace new leadership responsibilities for their role and …

Microsoft space
How Microsoft is taking cloud-powered innovation beyond Earth with Azure Space

The space community is growing rapidly and Microsoft’s Space team is developing capabilities and services to meet its needs for extended connectivity across the world, …

risk
How do I select a third-party risk management solution for my business?

COVID-19 has increased organizational focus on third-party risk management (TPRM) for 83% of companies, a recent study reveals. Yet, only 40% of organizations report expanding …

mobile security
How do I select a mobile threat defense solution for my business?

In an almost exclusively mobile world and the increased usage of mobile devices to access corporate data, cybercriminals started taking advantage of the vulnerability of such …

Guido Grillenmeier
How to improve your organization’s Active Directory security posture

Active Directory (AD), a directory service developed by Microsoft for Windows domain networks, is most organizations’ primary store for employee authentication and …

Big Data
How do I select a big data solution for my business?

Since big data consists of structured and unstructured data which is constantly growing in size, common software doesn’t have the ability to process and manage it. …

Google Workspace
A closer look at Google Workspace privacy and data security

Google recently unveiled the next evolution of Google Workspace, including new security and privacy capabilities to help users take advantage of trusted, cloud-native …

virtual soc
How do I select a virtual SOC solution for my business?

Other than a traditional SOC (security operations center) model, which offers continuous system monitoring to improve an organization’s security posture, there is also a …

ITSM
How do I select an ITSM solution for my business?

An IT service management (ITSM) solution guarantees that IT processes and services are combined with the business goals of an organization, thus helping it thrive. To select a …

Jack Williams
Data sharing in a smart city: Choosing the right approach

Smart cities should, ideally, work as a well-oiled clock, but we’re still far, far away from that. First of all, smart cities are still being built, one siloed segment …

Don't miss

Cybersecurity news