
How real-time computing can sound the kill chain alarm
Major attacks and ransomware incidents like SolarWinds, Colonial Pipeline or JBS highlight the critical role cybersecurity plays in protecting infrastructure and the economy. …

RIP guest access, long live shared channels!
While many yearn to return to pre-pandemic days, some aspects of our new normal are welcome. Most notable is the flexibility of hybrid working, with a great majority of …

How to build a zero-trust cloud data architecture
Cloud computing has had a profound impact on CISOs. They realize its cheap storage, immense scalability, resource elasticity and accessibility from anywhere in the world, at …

Review: Group-IB Digital Risk Protection
The COVID-19 pandemic has transformed our private and working lives. It has also forced companies to extend the network perimeter due to employees working from their homes and …

Collaboration is key for cloud innovation
Developers and security professionals work in very different ways. While the former is likely to move and innovate fast – with quick coding and rapid application building a …

The importance of compute lifecycle assurance in a zero-trust world
With the proliferation of attack surfaces in IoT, the increase in firmware-based attacks on hardware, and growing threats to systems throughout their lifecycle, companies are …

With Crime-as-a-Service, anyone can be an attacker
Crime-as-a-Service (CaaS) is the practice of experienced cybercriminals selling access to the tools and knowledge needed to execute cybercrime – in particular, it’s often used …

A digital shift requires a new approach to asset management: How to reduce security risks
The global pandemic forced organizations to rapidly accelerate their digital transformation. As a result, nearly overnight, companies spanning all sizes and sectors deployed …

A look at the 2021 CWE Top 25 most dangerous software weaknesses
The 2021 Common Weakness Enumeration (CWE) Top 25 Most Dangerous Software Weaknesses is a demonstrative list of the most common issues experienced over the previous two …

Navigating the 2021 threat landscape: Security operations, cybersecurity maturity
Ransomware attacks have been increasingly in the headlines, and reaching historic levels of impact. Findings from a new report from ISACA in partnership with HCL Technologies …

Organizations still rely on weak security for remote workers
A new survey of enterprise IT security leaders showed almost 80 percent believe remote workers are at more risk for phishing attacks now because they’re isolated from …

Retailers turn to zero trust to keep consumers and employees secure
Retailers have not only had to contend with the business disruption resulting from the COVID-19 pandemic, but they have also experienced increased security risks in the …