Please turn on your JavaScript for this page to function normally.
ransomware
Companies spending $6M on ransomware mitigation: Is it working?

A CBI and Ponemon Institute research report, based on a survey of IT and security professionals, takes a comprehensive look at companies’ ransomware strategies and mitigation …

healthcare
Help Net Security: Healthcare Cybersecurity Report has been released

Our newest report takes a closer look at one of the most targeted industries today – healthcare. As exhausted healthcare professionals struggle with an extraordinary …

CIS
How configuration assessments help improve cyber defenses

There’s an old adage in business; if you’re not measuring something, you can’t manage it. These days, information technology (IT) and information security …

data
To shift to data-driven security decision making: Start with the right data

We live in the age of data-driven everything. From sales to operations, and everything in-between, today’s organizations are constantly looking for ways to leverage the data …

bomb
Tackling supply chain security head-on

Threats against supply chains are growing and the reality is that the size, cost, and sophistication of these threats make it difficult for anyone organization to control or …

IoT
Securing IoT from the ground up

We live in a highly connected world. There are already approximately 10 billion connected Internet of Things (IoT) devices, and their number is expected to grow to over 25 …

zero
The importance of implementing a zero trust strategy

Optiv has published a report based on a recent survey of cybersecurity leaders that highlights the critical importance of implementing zero trust as an effective way to reduce …

virtual reality
Democratizing security with Open XDR

There is no denying the notion of strength in unity. Similarly, inclusiveness and the broad participation of many is another idea that is widely cherished. These are both …

cybersecurity investments
Why the C-suite should focus on understanding cybersecurity and investing appropriately

Trend Micro has published a research revealing that persistently low IT/C-suite engagement may imperil investments and expose organizations to increased cyber risk. Over 90% …

zero
Zero trust adoption will continue to mature

Illumio released findings of a study conducted by Forrester Consulting that explore how organizations are approaching their zero trust strategies in 2022 to better navigate …

chess
Why security strategies need a new perspective

After a stream of ransomware campaigns, data leaks, and attacks on critical infrastructure, businesses understand their digitization strategy needs to be complemented by a …

Code
78% of organizations expect to produce or consume SBOMs in 2022

The Linux Foundation announced the availability of the first in a series of research projects to understand the challenges and opportunities for securing software supply …

Don't miss

Cybersecurity news