The CISO’s guide to evaluating third-party security platforms
A comprehensive third-party security program can align your vendor’s security with your internal security controls and risk appetite. Such a program can also help you …
Compliance does not equal security
Buy these widgets. Write these policies. Be compliant. Be secure. While certain industry bodies set specific cybersecurity standards and requirements, following them is not …
SASE emerges as the edge becomes an enterprise focal point
Network attacks continue to proliferate, especially sophisticated probing of user domain registries, ransomware attacks, and malware injections via trojans. To further …
WFH is here to stay: Five tactics to improve security for remote teams
When the pandemic took hold, most companies were forced to turn their employees into a fully operational remote workforce within the span of one week. And while some …
Recommendations for improving DEI in cybersecurity teams
(ISC)² published a research study that highlights the unique challenges diverse cybersecurity professionals around the world face and provides recommendations to create …
Bots to become the future of work and provide ROI to organizations using them
The prolonged pandemic has already brought many changes to the workplace, and according to a TELUS International survey, 90% of U.S. employees believe bots will play a key …
Multi-factor authentications soar as enterprises move away from passwords to secure hybrid workers
Enterprises are taking steps to move away from passwords and adopting low-friction authentication methods to protect the hybrid workforce, a Cisco’s Duo Security report …
IoT investment to overtake other Industry 4.0 tech in the near future
Investment in IoT is set to overtake cloud computing, next generation security, big data analytics and other digital transformation technologies in the near future, according …
BEC attacks: Scammers’ latest tricks
BEC attacks are generally low-volume but, according to a recent survey by GreatHorn, 71% of organizations experienced at least one in the past year. Trend Micro’s latest …
Analyzing and implementing a national zero trust architecture
This October, we once again find ourselves observing National Cybersecurity Awareness Month. While this effort traditionally targets consumers and businesses, the U.S. …
The importance of crisis management in the age of ransomware
Cybersecurity crises are becoming commonplace. With the massive surge in ransomware attacks in the last few years, businesses can’t afford to ignore the increasing …
Cyber risk trends driving the surge in ransomware incidents
During the COVID-19 crisis, another outbreak took place in the cyber space: a digital pandemic driven by ransomware. In a recent report, Allianz Global Corporate & …
Featured news
Resources
Don't miss
- Scam Yourself attacks: How social engineering is evolving
- Addressing the intersection of cyber and physical security threats
- Fleet: Open-source platform for IT and security teams
- CERT-UA warns against “security audit” requests via AnyDesk
- Decentralization is happening everywhere, so why are crypto wallets “walled gardens”?