cybersecurity
Steps IT pros can take to prioritize interpersonal needs
Most people in the IT industry are familiar with the phrase “people, process, and technology.” While there are many technology and process standards within organizations, and …
Three reasons why context is key to narrowing your attack surface
2020 has been a year of radical change for cybersecurity. Lockdowns forced businesses to find new ways to maintain continuity. As a result, digital transformation initiatives …
Worldwide new account fraud declined 23.2% in 2020
New account fraud based on ID verification declined 23.2% worldwide YOY in 2020, compared to 2019 results, according to Jumio. At the same time, selfie-based fraud rates were …
Operational planning simulation for defense against an attacking drone swarm
The 2018 Winter Olympics in PyeongChang, South Korea stunned the world when they put on a dazzling light show made up of a record-breaking 1,218 drones, all dancing in …
SolarWinds is the tip of the iceberg
The recent SolarWinds software supply chain breach is a clear indication that strong OT cybersecurity is a must-have in today’s threat environment. Waterfall’s technologies …
Five ways COVID-19 will change cybersecurity
The main story of 2021 won’t be the disease, but the vaccine. With three effective, promising vaccines in development as of November, COVID-19 (and its treatment) will …
Disruption in 2020 paves the way for threat actors in 2021 and beyond
There’s no doubt that 2020 will be remembered for the uncertainty and rapid change it brought. As the global pandemic accelerated trends like remote working and digital …
Healthcare organizations to increase hybrid cloud deployments
Nutanix announced the healthcare industry findings of its report, measuring healthcare organizations’ plans for adopting private, hybrid and public clouds. The findings point …
Microsoft was also a victim of the SolarWinds supply chain hack
Microsoft has confirmed that it, too, is among the companies who have downloaded the compromised SolarWinds Orion updates, but that they have isolated and removed them. …
5 reasons IT should consider client virtualization
Virtualization has brought a dramatic level of growth and advancement to technology and business over the years. It transforms physical infrastructure into dedicated, …
2020 broke cybersecurity records, here’s what’s to come in the new year
With chaos and uncertainty reigning, 2020 created near-perfect conditions for cybercriminals. The COVID-19 pandemic transformed the way we live and triggered a mass migration …
Imagining a professional life without passwords
Passwords are a source of many security risks, with recent LastPass research revealing IT teams are spending five hours a week on average dealing with password-related issues. …
Featured news
Sponsored
Don't miss
- Ivanti patches critical Avalanche flaw exploitable via a simple message (CVE-2024-29204)
- Cheap ransomware for sale on dark web marketplaces is changing the way hackers operate
- Who owns customer identity?
- Enterprises face significant losses from mobile fraud
- Palo Alto firewalls: Public exploits, rising attacks, ineffective mitigation