Please turn on your JavaScript for this page to function normally.
connection
Industrial pros looking for a more focused approach to digital transformation

A highly focused approach to digital transformation is challenging the traditional top-down, all-or-nothing strategy, according to a report from Plutoshift. The findings …

identity theft
Rising physical threats putting leaders under pressure

Physical threats are rising and increasingly unmanageable, putting unprecedented financial, reputational and liability pressures on business leadership and security teams, …

reload
Achieving digital transformation by overcoming identity fatigue

Conversations about digital transformation (DX) are so frequent and pervasive that we tend to lose track of how incomplete they can be. You might think that DX only concerns …

Shark
Key cybersecurity problems expected to mark 2021

After a year in which COVID-19 upended the way we live, work and socialize, we are likely to see an increased threat from ransomware and fileless malware in 2021, according to …

data
Trends every IT leader needs to know to empower the enterprise

Only 37% of organizations definitely have the skills and technology to keep pace with digital projects during the COVID-19 pandemic, a MuleSoft survey reveals. Access to data …

patch
December 2020 Patch Tuesday forecast: Always consider the risk

The final Patch Tuesday of the year is upon us and what a year it has been. Forcing many changes this year, the pandemic has impacted the way we conduct both security and IT …

SASE
How to take SASE from a buzzword to a plan

Whether you are talking to your leadership or external auditors, it’s always best to be able to explain that your cybersecurity program is based on a framework utilizing …

find
Raising defenses against ransomware in healthcare

More than half a decade has passed since ransomware-wielding attackers started focusing on healthcare providers. Despite some initial misgivings about targeting life-saving …

risk
The three stages of security risk reprioritization

What began as a two-week remote working environment, due to COVID-19 has now stretched past the nine-month mark for many. The impact of telework on organizations can be felt …

cloud
Cloud native security: A maturing and expanding arena

At the recent KubeCon + CloudNativeCon North America 2020, I had the opportunity to take part in a keynote panel with a number of other cloud native security practitioners. We …

network
Demand for private network deployments will be driven by heavy industry verticals

With enterprise 5G maturing, the importance of private networks for the enterprise domain will continue to grow. According to ABI Research, the demand for private network …

ransomware
Foiling RaaS attacks via active threat hunting

In this Help Net Security podcast, Jon DiMaggio, Chief Security Strategist at Analyst1, talks about the characteristic of attacks launched by Ransomware-as-a-Service (RaaS) …

Don't miss

Cybersecurity news