Please turn on your JavaScript for this page to function normally.
zero
Things to know and do before you switch from VPN to ZTNA

Will your organization fall apart if you don’t switch from a VPN to a zero trust network access (ZTNA) solution in the near future? I’m here to tell you it won’t. The reality …

organize
How to start planning for disaster recovery

There is a famous quote I often think about at 3am on a Sunday morning as I am working with a client to recover from a large-scale cybersecurity incident: “Fail to prepare, …

cube
The cybersecurity industry will undergo significant changes in 2023

The cybersecurity industry will undergo some significant changes in 2023. As more systems get connected, we can expect to see more outages. We probably won’t see a …

search
Getting data loss prevention right

When a CISO takes the wrong approach to data loss prevention (DLP), it can quickly compound into a triple loss. First, they lose their organization’s money by investing in an …

world
Amplified security trends to watch out for in 2023

In 2023 and beyond, organizations can expect to continue dealing with many of the same threats they face today but with one key difference: expect criminals to leverage …

code
APIs are placing your enterprise at risk

At a surface level, APIs help businesses to connect applications and share data with one another. This creates an easier, more seamless experience for customers and users. If …

Hands
Make sure your company is prepared for the holiday hacking season

We’re coming to that time of the year when employees are excited about the holidays and taking time off to be with their loved ones. But while employees are preparing for some …

shield
Ensuring trust for high-value digital transactions

With the holiday season upon us, auto dealerships are facing an influx of consumers looking to swoop on end-of-year sales and holiday offers. While previous years saw a steady …

network
Will 2023 be another year of chaos and instability?

A defining characteristic of 2022 has been the way that online campaigns driven by real-world events have amassed unexpected energy, fueling hacktivism and inviting in global …

insider threat
3 major threat detection methods explained

The importance of threat detection cannot be overstated. A recent Verizon study revealed that the top discovery method (more than 50%) for breaches is in fact disclosure by …

Australia
Analyzing Australia’s cyberthreat landscape, and what it means for the rest of the world

Australia has been the victim of damaging cyberattacks in the latter half of this year, with high-profile incidents impacting businesses across critical sectors such as …

ransomware
Preventing a ransomware attack with intelligence: Strategies for CISOs

Bad news first: Ransomware isn’t going anywhere. The good news? The right intelligence can help organizations dramatically reduce risk surrounding a cyber extortion event. In …

Don't miss

Cybersecurity news