Cloud security today: Complexity, compliance, and containerization
An new report by Threat Stack and ESG sheds light on the security and business challenges that accompany the growth of public cloud environments and containers. Overall, the …
An new report by Threat Stack and ESG sheds light on the security and business challenges that accompany the growth of public cloud environments and containers. Overall, the …
A new ESG study, which surveyed more than 500 people aged 16 to 24, revealed that 74% of respondents said the use of VR tools would increase their likelihood of pursuing …
The main goal of threat hunting is to find traces attackers have left behind in the organization’s IT environment. These traces can date back to already solved crises or …
The principle of Attribute Based Access Control (ABAC) has existed for many years. It’s the evolution from simple access control lists and role-based access control, to a …
Security teams the world around are putting in hours every day to keep their company’s most prized assets secure. These are professionals that have spent considerable time …
Most security teams utilise a ‘prohibition approach’ – i.e. restricting user access to websites and applications – a tactic which is hampering productivity and innovation …
When a high profile vulnerability surfaces that is as far reaching as KRACK, a WPA2 encryption attack to hijack Wi-Fi networks, it’s common to respond impulsively. “Why are …
Although businesses recognize the importance of digital transformation, organizations worldwide are struggling to balance the elements needed to deliver on digital. Of 1,625 …
According to a survey conducted by Dimensional Research, 100 percent of respondents believe soft skills are important when hiring for their security teams. The three most …
Unpatched web infrastructure and de-centralised web management practices are leaving UK organisations vulnerable to cyber-attacks and high profile data breaches. New RiskIQ …
Almost half (49%) of global financial services organisations have experienced a data breach in the past, according to the 2017 Thales Data Threat Report, Financial Edition. …
We have recognised threats coming more regularly from varied origins such as nation-states, hacktivist and cybercriminal actors. Coupled with many new public policies aimed at …