Please turn on your JavaScript for this page to function normally.
Qualys CSAM
Helping security teams respond to gaps in security and compliance programs with Qualys CSAM

Unlike traditional inventory tools that focus solely on visibility or rely on third-party solutions to collect security data, Qualys CyberSecurity Asset Management (CSAM) is …

Europe
EUCC receives first EU cybersecurity certification scheme

In July 2019, the EUCC was the first candidate cybersecurity certification scheme request received by the EU Agency for Cybersecurity (ENISA) under the Cybersecurity Act. This …

endpoint protection
Endpoint complexities leaving sensitive data at risk

Absolute Software announced key findings from its report which shines a light on key trends affecting enterprise data and device security, and underscores the dangers of …

drown
The human cost of understaffed SOCs

SOC and IT security teams are suffering from high levels of stress outside of the working day – with alert overload a prime culprit, a Trend Micro study reveals. …

money
Security leaders more concerned about legal settlements than regulatory fines

An overwhelming 90% of security leaders are concerned about group legal settlements following a serious data breach, compared to 85% who are worried about regulatory fines, …

SIEM
Rethinking SIEM requires rethinking visibility

Security professionals now generally recognize that siloed security tools and systems have undercut efforts to find active attacks more quickly and efficiently. Information …

network
Best practices for securing the CPaaS technology stack

Like everything that’s connected to the cloud, Communications Platform-as-a-Service (CPaaS) solutions are vulnerable to hacking, which increased dramatically as workforces …

SD-WAN
The value of SD-WAN connectivity

Masergy released the results of a research study assessing where businesses are in their journey to SD-WAN and Secure Access Service Edge (SASE). The results include new …

backup
How colocation can improve TCO for the enterprise

CoreSite and IDG released a report which examines the latest data center trends, strategies, requirements, and other findings from an annual quantitative survey and in-depth …

lock
Organizations have seen an increase in device encryption

32% of organizations have seen an increase in device encryption in the past year, according to a Vanson Bourne survey. Additionally, 31 percent noted that their organization …

cloud
SeKVM: Securing virtual machines in the cloud

Whenever you buy something on Amazon, your customer data is automatically updated and stored on thousands of virtual machines in the cloud. For businesses like Amazon, …

week in review
Week in review: VMware critical updates, prevalent enterprise cybersecurity risks, 3 years of GDPR

Here’s an overview of some of last week’s most interesting news and articles: Belgium’s Interior Ministry uncovers 2-year-long compromise of its network Belgium’s Federal …

Don't miss

Cybersecurity news