Please turn on your JavaScript for this page to function normally.
backup
Dealing with security vulnerabilities on data center servers requires more skilled staff

There is a lot of attention being paid to continuously updating servers to patch security vulnerabilities on Linux servers running in data centers – a basic step …

user
It takes more than MFA to beat human hacking

While multi-factor authentication (MFA) is a much-needed addition to an effective cyber defense strategy, it is by no means foolproof. In fact, no single security effort can …

threat modeling
79% of organizations identify threat modeling as a top priority in 2021

Security Compass published the results of a report designed to provide a better understanding of the current state of threat modeling in mid-sized, $100M to $999M and large …

cloud
85% of organizations are yet to hit the cloud native technologies adoption milestone

Despite high adoption rates of cloud native technologies in recent years, enterprises have yet to cross the chasm to full adoption, but they’re quickly moving in that …

Good
Cybersecurity posture confidence high, yet incidents are increasing too

IronNet Cybersecurity released a report assessing timely topics such as the estimated cost per enterprise of the SolarWinds cyberattack, executive-level engagement in attack …

SecOps
The impact of current and emerging threats on the day-to-day lives of SecOps teams

More than half of IT and cybersecurity professionals noted ransomware or zero-day attacks as the biggest threats to their organization, according to a Deep Instinct survey. …

gears
Embrace integrations and automation as you build a security program

AI, machine learning, continuous compliance, automation, integrations – these are the buzzwords in IT compliance right now. What do they mean and how can a startup or …

glasses
Effects of the pandemic on consumer security behaviors

IBM announced the results of a global survey examining consumers’ digital behaviors during the pandemic, as well as their potential long-term impact on cybersecurity. …

audio
PrivacyMic: A smart home system that doesn’t record speech

Microphones are perhaps the most common electronic sensor in the world, with an estimated 320 million listening for our commands in the world’s smart speakers. The …

icosahedral
Data teams are discovering the benefits of automation and flexible coding

Ascend.io announced results from its research study about the work capacity and priorities of data teams, including data analysts, data scientists, data engineers, and …

user
Four proactive steps to make identity governance a business priority

Securing digital identities is crucial to business success today, but far too often, it’s an afterthought. As such, identity governance shouldn’t be celebrated as a singular …

lock
The state of AppSec and the journey to DevSecOps

While the perceived benefits of DevSecOps to both security and DevOps are high, much progress must be made in defining a repeatable and consistent governance model for true …

Don't miss

Cybersecurity news