Please turn on your JavaScript for this page to function normally.
network
Have we put too much emphasis on protecting the network?

Recently, much of the cybersecurity commentary and blogs have talked about new approaches for protecting the network, especially beyond the perimeter. For the past few years, …

bomb
Small security teams overwhelmed by onslaught of cyber attacks

Companies with small security teams, generally SMEs, are facing a number of unique challenges, placing these organizations at greater risk than their larger enterprise …

IoT
The evolution of IoT asset tracking devices

Asset tracking is one of the highest growth application segments for the Internet of Things (IoT). According to a report by ABI Research, asset tracking device shipments will …

MacBook Pro
Work-from-home creates multitude of opportunities for leaks

Breaches of corporate and government data appear to be running at a level even higher than experts had feared going into stay-at-home orders due to COVID-19, the International …

find
Cloud + BYOD + IoT = major security gaps

Despite having hundreds of tools at their disposal, IT and security teams are rapidly losing sight of their asset landscape. That’s the finding from a survey from Axonius, …

spreadsheet
43% of IT professionals are still tracking assets in spreadsheets

43% of IT professionals report using spreadsheets as one of their resources for tracking assets, according to Ivanti. Further, 56% currently do not manage the entire asset …

robot
Cybersecurity automation? Yes, wherever possible

There was a time when companies were hesitant about their IT and security teams using automation to discharge some of their duties. “I think much of that was due to the …

ransomware
Ransomware attack leaves Johannesburg residents without electricity

A ransomware attack aimed at City Power, the electricity provider for Johannesburg (aka Joburg), South Africa, has resulted in some residents temporarily without power. While …

idea
Endpoint breach prevention by reducing attack surfaces

In this podcast recorded at Black Hat USA 2018, Chris Carlson, VP of Product Management, Cloud Agent Platform at Qualys, talks about endpoint breach prevention by reducing …

Qualys provides visibility of inaccessible IT assets

Qualys announced a new Out-of-Band Configuration Assessment (OCA) module that allows customers to achieve complete visibility of all known IT infrastructure by pushing …

healthcare
Securing healthcare organizations: The challenges CISOs face

Healthcare organizations are ideal targets for criminals looking to steal personal and other sensitive information, as the industry is lagging behind when it comes to …

handshake
How security leaders can be empowered to drive results

The overwhelming demands on security leaders today can have a paralyzing effect. Gartner analysts provided guidance to security and risk leaders and practitioners on how to be …

Don't miss

Cybersecurity news