Please turn on your JavaScript for this page to function normally.
zero
What’s holding back zero trust implementation for device access?

A study by Infinipoint has revealed a significant gap between a high level of interest in zero trust for device access yet relatively low adoption due to obstacles in …

businessman
Companies should evolve their cybersecurity strategy in light of the Great Resignation

While the obvious challenge of the Great Resignation is rising labor shortages, the phenomenon is now posing a critical risk to another important aspect of the workforce: …

cloud
As breaches soar, companies must turn to cloud-native security solutions for protection

Over the past two years, companies’ adoption of public cloud services has surged, but fast-paced change and weaker security controls have led to an increase in data breaches, …

Audit
The challenges audit leaders need to look out for this year

Attracting talent with nontraditional skills to audit is the top challenge for audit leaders this year, according to Gartner. A July 2021 survey of 166 audit leaders revealed …

DevOps
Securing DevOps amid digital transformation

There are always new buzzwords/phrases being bandied about. In the late 1990s it was “long tail of the Internet” and “new paradigms”. Then there was this new thing referred to …

zero
The not so scary truth about zero-day exploits

We don’t know what we don’t know; this is the quintessential problem plaguing security teams and the primary reason that zero-day exploits can cause such damage. …

cyber insurance
How the increase in ransomware has impacted the cyber insurance market

Panaseer shares data on actions enterprises are willing to take to solve the escalating cyber insurance crisis. In recent years the cyber landscape has been dominated by a …

Log4j
Qualys platform study: Log4Shell, the menace continues

The anatomy of Log4Shell By now, we are all familiar with the fact that Log4Shell is just about as critical as a critical vulnerability can get – scoring a 10 out of 10 on the …

red teaming
Cybersecurity Red Team 101

“Red Team” is an expression coined in the 19th century, related to German military preparedness exercises conducted as realistic board games between two adversaries operating …

cloud
Hybrid cloud solutions are the long-term target for most companies

A Hornetsecurity hybrid cloud adoption survey of 900+ IT professionals primarily based in North America and Europe found that 93% of businesses are adopting a hybrid of cloud …

bot
Top 5 myths businesses believe about bots

Netacea announced the results from a new report showing that most businesses do not fully understand the threat bots pose, leaving those organizations vulnerable to threats. …

Cloud
The problem with multiple cloud security tools: Alert fatigue and burnout

Orca Security released a research report on public cloud security alert fatigue. The survey, held among over 800 IT professionals across five countries and ten industries …

Don't miss

Cybersecurity news