Please turn on your JavaScript for this page to function normally.
Work
IT leaders adapting to new challenges by prioritizing collaboration, cloud and security

CIOs and IT decision makers (ITDMs) are looking to maximize investments and drive innovation after a difficult year which raised the profile of IT leaders in driving critical …

Tackling cross-site request forgery (CSRF) on company websites

Everyone with half a mind for security will tell you not to click on links in emails, but few people can explain exactly why you shouldn’t do that (they will usually offer a …

code
80% of security leaders would like more control over their API security

There are major gaps in API security based on insights from over 100 senior security leaders at large enterprises in the United States and Europe, an Imvision report reveals. …

tools
Rapid increase in security tools causing alert fatigue and burn out

On average, enterprises maintain 19 different security tools, with only 22% of such tools serving as vital to primary security objectives, a ReliaQuest survey reveals. The …

network
The democratization of the workplace through edge computing

It’s been a year since we first learned about COVID-19, but the pressure on businesses to accelerate their digital transformation (DX) efforts has not abated. Of particular …

Jean Le Bouthillier
With data volumes and velocity multiplying, how do you choose the right data security solution?

There is no doubt that the COVID-19 pandemic has caused radical changes in our personal and working lives. The sudden and massive surge of employees working from home and the …

cloud
The future of IT security: All roads lead to the cloud

More and more applications – and with them workflows and entire business processes – are finding their way into the cloud. Analysts predict that IT security will follow suit, …

woman
Women helping women: Encouraging inclusivity in the cybersecurity industry

Since 1987, the month of March has been known as Women’s History Month, celebrating the historical achievements and contributions of women around the world. It is especially …

money
Why is financial cyber risk quantification important?

Cyber incidents are a major risk facing organizations and companies of all sizes and industries. These risks have only increased in the past year, with much of the workforce …

magnifying glass
If you are not finding vulnerabilities, then you are not looking hard enough

Building security and privacy into products from concept to retirement is not only a strong development practice but also important to enable customers to understand their …

face
Why data privacy will be the catalyst for digital identity adoption

Most of us probably don’t think of buying a bottle of wine as a security risk. However, we inadvertently give away our address, surname, nationality and signature – …

connection
How digital leaders built a foundation for resiliency in the face of disruption

During the past year, digital leaders deployed a remote workforce, engaged customers via contactless delivery and weathered various business disruptions throughout the year. …

Don't miss

Cybersecurity news