Using confidential computing to protect Function-as-a-Service data
Organizations are embracing the power of Function-as-a-Service (FaaS). FaaS can be viewed as a very positive and beneficial result coming from years of data successfully …
How do I select a SIEM solution for my business?
A Security Information and Event Management (SIEM) solution collects and analyzes activity from numerous resources across your IT infrastructure. A SIEM can provide …
Marred by garbage: Striking a balance for security data
Security applications are subject to the age-old computing axiom of “garbage in, garbage out.” To work effectively, they need the right data. Too much irrelevant data may …
Why identity-based, distributed controls are better suited to address cloud-era threats
With more and more IT resources moving to the cloud and remote work becoming a ubiquitous business practice due to COVID-19, perimeter-based security is undeniably becoming a …
With regard to industrial cyber, we can no longer hide our heads in the sand
The massive attack on national infrastructures in Australia, only recently publicized, as well as the attack on Israel’s water infrastructure, do well to illustrate the …
How to establish a threat intelligence program
Instituting an in-house cyber threat intelligence (CTI) program as part of the larger cybersecurity efforts can bring about many positive outcomes: The organization may …
Ransomware perspectives: The shape of things to come
Michael Hamilton, CISO of CI Security, has worked in the information security industry for 30 years. As former CISO for the City of Seattle, he managed information security …
How do I select a mobile security solution for my business?
The percentage of companies admitting to suffering a mobile-related compromise has grown, despite a higher percentage of organizations deciding not to sacrifice the security …
5 cybersecurity considerations for getting back to work securely
As governments begin lifting emergency orders, company leaders are considering policies, technology and processes that will protect their workforces. Many of these factors …
Keep remote workers and their devices secure with one click
In this interview for Help Net Security, Shailesh Athalye, VP Compliance at Qualys, discusses cloud-based Remote Endpoint Protection and illustrates how security teams can …
Building relationships: The key to becoming a true cybersecurity leader
Slowly but surely, organizations are starting to view information security as a business problem, not an IT problem, and as everybody’s responsibility. “The CISO …
How do I select a security awareness solution for my business?
“Great security awareness training, that is part of a healthy cyber security culture and that is aimed at encouraging positive security behaviours, is essential. The …
Featured news
Sponsored
Don't miss
- Palo Alto firewalls: Public exploits, rising attacks, ineffective mitigation
- Thinking outside the code: How the hacker mindset drives innovation
- Cybersecurity jobs available right now: April 17, 2024
- Damn Vulnerable RESTaurant: Open-source API service designed for learning
- Understanding next-level cyber threats