zero trust
When protecting and managing digital identities, orchestration and automation are critical
In this interview with Help Net Security, David Mahdi, CSO of Sectigo, talks about the importance of digital identity management, the issues organizations have with digital …
Trends that will shape the security industry in 2022
Entering 2022, the world continues to endure the pandemic. But the security industry has, no doubt, continued to shift, adapt, and develop in spite of things. Several trends …
Zero-trust security market to reach $64.4B by 2027
Amid the COVID-19 crisis, the global market for zero-trust security estimated at $18.3 billion in the year 2020, is projected to reach a revised size of $64.4 billion by 2027, …
Why is intergenerational collaboration critical in advancing zero trust security progress?
Baby Boomers play a critical role in accelerating zero trust security frameworks due to experience in integrating legacy technologies into cloud and hybrid IT environments, an …
The future of security protocols for remote work
Cybercrime has been growing rapidly for years, and the sudden pandemic-fueled shift to work from home (WFH) only accelerated the threat, forcing businesses to start putting a …
The public sector is more concerned about external than internal threats
SolarWinds announced the findings of its Public Sector Cybersecurity Survey Report. This survey includes responses from 400 IT operations and security decision makers, …
Supply chains, ransomware, zero trust and other security predictions for 2022
As 2021 draws to a close, no one in their right mind thinks that cybersecurity risk is just someone else’s problem anymore; major cybersecurity incidents like the SolarWinds …
Rethinking cybersecurity becomes imperative as devices and apps move away from physical offices
69.1% of professionals with security responsibility believe a rethink is needed to deal with the threat of cybersecurity now that devices and applications have moved outside …
Zero trust isn’t just for IT, it can also protect targeted critical infrastructure
Gartner predicts that by 2025 cyber attackers will have weaponized OT environments to successfully harm or kill humans. Not only is a solution to secure OT assets imperative, …
Immudb: Open-source database, built on a zero trust model
Now, with full transactional support for everyday business applications, the open source immudb tamper-proof database can serve as the main transactional database for …
When done right, network segmentation brings rewards
96% of organizations claim to be implementing segmentation in their networks, yet only 2% of those organizations are segmenting all six mission-critical asset classes, …
Top practices to improve enterprise security
Cisco released its latest cybersecurity report, surveying more than 5,100 security and privacy professionals across 27 markets to determine the most impactful measures teams …
Featured news
Resources
Don't miss
- Mitel MiCollab zero-day and PoC exploit unveiled
- 8 US telcos compromised, FBI advises Americans to use encrypted communications
- Download: The Ultimate Guide to the CCSP
- Preparing for Q-day: The essential role of cloud migration in securing enterprise data
- How the Shadowserver Foundation helps network defenders with free intelligence feeds