strategy

What is Ransomware Protection as a Service?
Ransomware attacks have devastating consequences for many businesses. Those go beyond the monetary loss tied to ransom-encrypted data, and include disrupted operations, …

How to keep your medical device IP safe from cyber attacks
Guarding intellectual property (IP) has always been a priority for medical device manufacturers as competitors and even nation states are constantly trying to compromise or …

Apps, devices and workloads provide an ecosystem cornerstone for zero trust growth
As cybersecurity professionals, we admit it: zero trust has become the industry’s biggest buzzword. Some argue it’s a principle, others argue it’s a framework, others still …

How businesses benefited from cloud transformation
Aptum released a report which explores the deployment of workloads on different cloud infrastructures and examines the decision-making process behind their placement. The …

IoT security is foundational, not optional
A PSA Certified report predicts that this year will mark a turning point in securing the Internet of Things (IoT), as the industry collectively commits to addressing the …

Companies spending $6M on ransomware mitigation: Is it working?
A CBI and Ponemon Institute research report, based on a survey of IT and security professionals, takes a comprehensive look at companies’ ransomware strategies and mitigation …

Help Net Security: Healthcare Cybersecurity Report has been released
Our newest report takes a closer look at one of the most targeted industries today – healthcare. As exhausted healthcare professionals struggle with an extraordinary …

How configuration assessments help improve cyber defenses
There’s an old adage in business; if you’re not measuring something, you can’t manage it. These days, information technology (IT) and information security …

To shift to data-driven security decision making: Start with the right data
We live in the age of data-driven everything. From sales to operations, and everything in-between, today’s organizations are constantly looking for ways to leverage the data …

Tackling supply chain security head-on
Threats against supply chains are growing and the reality is that the size, cost, and sophistication of these threats make it difficult for anyone organization to control or …

Securing IoT from the ground up
We live in a highly connected world. There are already approximately 10 billion connected Internet of Things (IoT) devices, and their number is expected to grow to over 25 …

The importance of implementing a zero trust strategy
Optiv has published a report based on a recent survey of cybersecurity leaders that highlights the critical importance of implementing zero trust as an effective way to reduce …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous