Please turn on your JavaScript for this page to function normally.
XDR
Can XDR bring the kill chain back to its roots?

When Lockheed Martin engineers first came up with the cyber kill chain concept, the purpose was clear – to mitigate or eliminate a cyberattack. It borrowed from military …

biometrics
The evolution of identity-first security

Earlier this year, Gartner named identity-first security as one of the top security and risk management trends for 2021. Companies have been moving away from traditional LAN …

Flavio Aggio
World Health Organization CISO suggests a holistic approach to cybersecurity

Flavio Aggio, CISO at the World Health Organization, has had a challenging year. Since the onset of the COVID-19 pandemic, the WHO has become a significant target for …

network
Security matters when the network is the internet

In the past, network security was too often viewed as a separate issue to the design of the network itself, which led to solutions being either poorly thought out or hastily …

industrial
Why ransomware is such a threat to critical infrastructure

A recent spike in large-scale ransomware attacks has highlighted the vulnerabilities in the nation’s critical infrastructure and the ease with which their systems can be …

user
Demystifying cybersecurity with a more human-centric approach

Every business, whether small or large, needs to address cybersecurity to operate in today’s online world. This has been a stimulus for the cybersecurity industry and explains …

geometry
How real-time computing can sound the kill chain alarm

Major attacks and ransomware incidents like SolarWinds, Colonial Pipeline or JBS highlight the critical role cybersecurity plays in protecting infrastructure and the economy. …

arrows
RIP guest access, long live shared channels!

While many yearn to return to pre-pandemic days, some aspects of our new normal are welcome. Most notable is the flexibility of hybrid working, with a great majority of …

cloud complexity
How to build a zero-trust cloud data architecture

Cloud computing has had a profound impact on CISOs. They realize its cheap storage, immense scalability, resource elasticity and accessibility from anywhere in the world, at …

Group-IB Digital Risk Protection
Review: Group-IB Digital Risk Protection

The COVID-19 pandemic has transformed our private and working lives. It has also forced companies to extend the network perimeter due to employees working from their homes and …

cloud binary
Collaboration is key for cloud innovation

Developers and security professionals work in very different ways. While the former is likely to move and innovate fast – with quick coding and rapid application building a …

zero
The importance of compute lifecycle assurance in a zero-trust world

With the proliferation of attack surfaces in IoT, the increase in firmware-based attacks on hardware, and growing threats to systems throughout their lifecycle, companies are …

Don't miss

Cybersecurity news