Please turn on your JavaScript for this page to function normally.
globe
Top 10 predictions and key drivers for the IT industry for the next five years

Over the past several years, IT and business leaders have been focused on the digital transformation (DX) their organizations must go through as they reimagine their …

industry
Safeguarding global critical networks now and in the future

Lior Frenkel is the CEO and co-founder of Waterfall Security Solutions, a provider of unidirectional security gateways, stronger-than-firewalls perimeter security solutions …

Face
How to protect your organization from insider threats, the #1 risk for data loss

Is your security approach exposing your organization to risk? The answer is “yes” if your security strategy focuses exclusively on external threats. If the breaches of the …

idea
Bring visibility to shadow APIs and ensure that security standards are being met

Last week Data Theorem introduced the industry’s first automated API discovery and security inspection solution aimed at addressing API security threats introduced by today’s …

cloud
Organizations feel ready to put highly sensitive data in the cloud

Many corporate employees are ready to store highly sensitive data in the cloud. However, many are still skeptical of the security posture of their own organizations, according …

network
Security should be a top priority when transitioning to an SD-WAN solution

Barracuda Networks today released key findings from a new global research report, “Security, Connectivity, and Control: The Challenges and Opportunities of …

hunt
Organizations want to threat hunt, but can’t due to lack of time, skills and visibility

As cybercriminals and nation-states continue to improve the sophistication of attacks that bypass traditional preventive defenses, organizations must evolve their security …

network
Consumer skepticism and stronger protections call for security changes

2018 became the year where protecting personal information established itself as a right that is wanted by and entitled to citizens. More people started questioning who owns …

building
Building shared digital identity using blockchain technology

I previously described challenges both consumers and organizations face when it comes to user identity and how a shared digital identity can reshape digital trust as we know …

insider threat
How science can fight insider threats

Malicious insiders pose the biggest cybersecurity threat for companies today because they can cause the most damage, and are much harder to detect than outsiders. From the …

industry
The risk to OT networks is real, and it’s dangerous for business leaders to ignore

Data from the new CyberX CyberX Global ICS & IIoT Risk Report shows major security gaps remain in key areas such as plain-text passwords, direct connections to the …

finance
How to make the CFO your best cybersecurity friend

I’m bad dinner company. As the CFO of a cloud technology provider, I like to speak about finance and cybersecurity, two topics entirely capable of putting my dinner guests to …

Don't miss

Cybersecurity news