strategy
Most breaches largely caused by staff working from home
Diligent announces a survey of 450 senior finance and risk professionals in UK-listed businesses. The results show that UK businesses lost £374 million in 2021, largely due to …
How organizations are arming themselves to combat threats
Reblaze announced the results of a Global Surveyz survey of 300 security professionals, to better understand how organizations are approaching web security as we enter a new …
How to measure security efforts and have your ideas approved
In this interview with Help Net Security, Malcolm Harkins, Chief Security & Trust Officer, Epiphany Systems, talks about the challenges security leaders must face when …
Top concerns for operating cloud-native technologies
Platform9 announced the results of its research, revealing that 91% of survey respondents cite security, consistent management across environments, high availability, and …
What makes achieving cyber resilience difficult?
Anomali published a report which provides visibility into the current threat landscape, reveals the top challenges to establishing a resilient cybersecurity posture, and …
65% of organizations continue to rely on shared logins
As organizations look to embrace modern approaches to security in 2022, a strongDM survey has revealed that access management is one of the most crucial factors to achieving …
Strong security starts with the strengthening of the weakest link: passwords
Darren Siegel is a cyber security expert at Specops Software. He works as a lead IT engineer, helping organizations solve complex challenges within IT security. In this …
The future of security protocols for remote work
Cybercrime has been growing rapidly for years, and the sudden pandemic-fueled shift to work from home (WFH) only accelerated the threat, forcing businesses to start putting a …
The public sector is more concerned about external than internal threats
SolarWinds announced the findings of its Public Sector Cybersecurity Survey Report. This survey includes responses from 400 IT operations and security decision makers, …
Eight resolutions to help navigate the new hybrid office model
Continuous review and improvement are crucial for a successful security program. As this year draws to a close, it is a good time to look back on 2021 and prepare a few …
Network and security teams must collaborate to successfully deliver digital transformation
Collaboration is a key component of any successful business strategy, but it’s not always a simple task. The conflicting goals of individual teams means that different …
Bridging the “front and back of the house”: A lesson in risk management
Between cloud proliferation, new tech infrastructure and tools and an increasingly distributed workforce, organizations are struggling to implement proper risk management …
Featured news
Resources
Don't miss
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity
- Counterfeit defenses built on paper have blind spots
- Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits