Please turn on your JavaScript for this page to function normally.
cloud
How to mitigate security risks as cloud services adoption spikes

Millions have flocked to video-conferencing solutions and organizations have relied more heavily on various applications (such as G Suite for end users, Azure for developers, …

woman
49% of female cybersecurity pros say the pandemic had a positive impact on their career

While the global job market has been hit hard by the pandemic, cybersecurity job recruitment thrived in 2020. According to a new global report from Tessian, 94% of security …

SASE
Only 12% of enterprises have fully embraced SASE

Although many public and private sector organizations have elements of SASE in their IT stack, only 12% worldwide currently have a comprehensive SASE architecture, according …

brain
Starting your cybersecurity career path: What you need to know to be successful

As COVID-19 spread across the world, organizations found themselves more exposed to cyber threats than ever before and the cybersecurity skills gap became even more obvious. …

SOAR
How do I select a SOAR solution for my business?

Security Orchestration, Automation and Response (SOAR) products offer an appealing solution, promising efficiencies in detecting and responding to threats. However, …

security awareness
Security awareness programs: The difference between window dressing and behavior change

CISOs are responsible for pursuing cybersecurity purchases that align with the overall health of their organizations. All investments must drive tangible value and ROI while …

Work
Trends that will influence remote work in 2021 and beyond

Motus released a report which examines the trends that will influence remote work in 2021 and beyond. Remote work in 2021 and beyond While U.S. organizations rapidly …

arrows
Risky business: 3 timeless approaches to reduce security risk in 2021

Since the COVID-19 pandemic drove workforces home, we’ve seen an increase in security risk across the board: from an increase in phishing and spear phishing attacks to an …

building
Security starts with architecture

The battle against hackers and threats is an arms race against highly motivated opponents, and with the number of attacks and threats continually growing, it’s …

cloud
32% of enterprises experienced unauthorized access to cloud resources

A new report conducted by Dimensional Research revealed that 32% of enterprises experienced unauthorized access to cloud resources, and another 19% were unaware if …

account
Businesses trust their remote employees are sufficiently skilled to mitigate cybersecurity risks

80% of businesses worldwide are confident their remote employees, specifically those working with finance software or participating in official company transactions, have the …

10 CISO strategies
10 strategies small security teams can use for effective cybersecurity management

As the challenges of smaller security teams are certainly different than with larger teams, these IT professionals must be more creative and pragmatic than their large …

Don't miss

Cybersecurity news