Please turn on your JavaScript for this page to function normally.
hotel
Cybersecurity guide for the hospitality industry

A practical cybersecurity guide from the National Institute of Standards and Technology (NIST) can help hotel owners reduce the risks to a highly vulnerable and attractive …

fast
The benefits of cyber threat intelligence

In this Help Net Security podcast, Maurits Lucas, Director of Intelligence Solutions at Intel 471, discusses the benefits of cyber threat intelligence. He also talks about how …

cloud
Cloud-native watering hole attack: Simple and potentially devastating

In this era of increasing technological complexity, watering hole attacks build on a model of simplicity. Just like predatory animals that hover near sources of water favored …

cloud
Financial organizations struggling to secure data in the cloud

In 2020, the most common incidents that financial organizations suffered regarding data in the cloud were phishing attacks (reported by 26%), targeted attacks on cloud …

person
The impact of the CCPA on companies’ privacy practices

A new DataGrail report examined how millions of California consumers are exercising their privacy rights – to access their data, delete their data, and stop the sale of …

tax season
Death, taxes, and hacks: How to prevent cyberattacks during tax season

Remember how folks did taxes in the olden days? They’d collect large piles of paper documents, fill out endless pages of forms, stuff a bunch of receipts in a shoebox and – …

zero
How to avoid 4 common zero trust traps (including one that could cost you your job)

Formulated by a research analyst over a decade ago, the zero-trust security model was embraced by thought leaders. And when Google, with its unlimited budget and resources, …

data
How much of the data created and replicated should be stored?

The amount of data created and replicated experienced unusually high growth in 2020 due to the dramatic increase in the number of people working, learning, and entertaining …

criminal
CSAE: Guiding principles and best practices for data scientific investigations of organized crime

A white paper published by REPHRAIN, in collaboration with the Dutch National Police, offers a solution to big data problems that tend to hamper police probes into this type …

network
The democratization of the workplace through edge computing

It’s been a year since we first learned about COVID-19, but the pressure on businesses to accelerate their digital transformation (DX) efforts has not abated. Of particular …

backup
Two new ways backup can protect enterprise SaaS data

Software-as-a-Service (SaaS) apps are a treasure trove of information. They’re where business takes place and decisions get made, so it’s not surprising that they’re …

icosahedral
The impact of the pandemic on digital transformation and data access

Data access has become more critical for 53% of survey respondents throughout the pandemic as analytics workloads and demands increase significantly, according to a survey …

Don't miss

Cybersecurity news