strategy
What is the impact of remote work on security best practices?
Employees are now accessing resources from any device and from anywhere outside of their corporate domain, a JumpCloud survey reveals. The report details the impact of …
SOC burnout is real: 3 preventative steps every CISO must take
Consider this scenario: Morgan, a level 3 security analyst, arrives to a twelve-hour security operations center (SOC) shift and finds a message that a network sensor is …
Shame culture is the biggest roadblock to increasing security posture
Cybersecurity culture is nearly impossible to quantify due to an absence of measurement tools. Many businesses attempt to quantify the human element of their security posture …
The paradox of post-quantum crypto preparedness
Preparing for post-quantum cryptography (PQC) is a paradox: on the one hand, we don’t know for sure when, or perhaps even if, a large quantum computer will become available …
Best practices for IT teams to prevent ransomware attacks
According to Check Point research, the number of organizations affected by ransomware has been growing at 9% monthly since the start of the year. From WannaCry, Petya, and …
Driving network transformation with unified communications
Unified communications (UC) has become a significant part of an organization’s digital transformation strategy, with the aim of establishing strong and reliable communication …
Can blockchain and MPC technology protect the integrity of auctions?
Auctions have stood the test of time. History provides evidence as far back as 500 BC in Babylon by the Romans. Today, the ancient institution that has shaped the trading …
76% of IT decision makers more vulnerable to mobile attacks than just a year ago
53 percent of IT decision makers admitted that it’s not possible to be prepared for all the tactics and strategies used by attackers targeting mobile devices, a survey by …
Embrace integrations and automation as you build a security program
AI, machine learning, continuous compliance, automation, integrations – these are the buzzwords in IT compliance right now. What do they mean and how can a startup or …
How to rethink risks with new cloud deployments
These days, technology seems to evolve at the speed of light. Infrastructures change, attack surfaces reduce and multiply and, not surprisingly, your cloud environment …
Multi-cloud transit enhances app experience but brings complexity and security challenges
Sapio Research conducted a survey of more than 400 IT leaders at U.S.-based organizations with more than 1000 employees which offers a picture for enterprises transitioning to …
What is the real cost of ransomware?
Cybereason released research findings from a global ransomware study of nearly 1,300 security professionals that reveals more than half of organizations have been the victim …
Featured news
Sponsored
Don't miss
- Patch actively exploited Microsoft SharePoint bug, CISA orders federal agencies (CVE-2023-24955)
- Debunking compliance myths in the digital era
- How CISOs tackle business payment fraud
- AI framework vulnerability is being used to compromise enterprise servers (CVE-2023-48022)
- Attackers leverage weaponized iMessages, new phishing-as-a-service platform