cybersecurity
Five ways to maximize FIDO
Perform a quick Google search for “causes of data breaches”, and you will be inundated with reports of stolen credentials and weak passwords. Organizations can spend billions …
The benefits of providing employees with an identity compromise solution
Employees find significant value in having access to an identity compromise solution, having an available remediation solution creates a better mindset for those that use it, …
Telehealth is the future of healthcare, but how secure is it?
54 percent of Americans have opted for virtual visits during pandemic, a CynergisTek survey reveals. Of those, more than 70 percent of respondents plan to continue to use …
Large-scale migrations away from on-premise environments are underway
COVID-19 has had a massive effect on DevOps, leading to large-scale migrations away from on-premises environments, a Codefresh survey reveals. At the same time, DevOps …
Publicly reported data breaches down 52%, exposed records way up!
Although the number of publicly reported data breaches stands at its lowest in five years, the number of records exposed is more than four times higher than any previously …
3 tips to increase speed and minimize risk when making IT decisions
There is nothing like a crisis to create a sense of urgency and spawn actions. This is especially true for enterprise IT teams, who are tasked with new responsibilities and …
Internal audit leaders should develop new skills to stay relevant
Chief audit executives (CAEs) and internal audit leaders report their next-generation competency levels in three vital areas – governance, methodology and enabling technology …
Healthcare breaches declined sharply during the first half of 2020
This has been a very challenging year. Despite the COVID-19 outbreak starting in the first half of 2020, data analyzed from the Health and Human Services (HHS) Office for …
Army researchers awarded patent for secure comms
Army researchers have been awarded a patent for inventing a practical method for Army wireless devices to covertly authenticate and communicate. Photo by Jason Edwards …
State-backed hacking, cyber deterrence, and the need for international norms
As time passes, state-backed hacking is becoming an increasingly bigger problem, with the attackers stealing money, information, credit card data, intellectual property, state …
In reality, how important is zero trust?
Although most IT and security professionals think of zero trust as an important part of their cybersecurity approach, many still have a long way to go on their quest to …
CIOs prioritizing IAM over endpoint security and security awareness training
CIOs are prioritizing identity and access management (IAM) over endpoint security and security awareness training in 2020, according to a Hitachi ID survey. The survey, …
Featured news
Sponsored
Don't miss
- Applying DevSecOps principles to machine learning workloads
- Overcoming GenAI challenges in healthcare cybersecurity
- 25 cybersecurity AI stats you should know
- Hackers backdoored Cisco ASA devices via two zero-days (CVE-2024-20353, CVE-2024-20359)
- PoC for critical Progress Flowmon vulnerability released (CVE-2024-2389)