Expert analysis

Security automation: Time for a new playbook
From increasingly sophisticated threats to the mad concoction of on-premise and cloud solutions that comprise most organizations’ IT infrastructure and the plethora of new IoT …

Secure enclave protection for AI and ML
You can’t swing a virtual bat without hitting someone touting the value of artificial intelligence (AI) and machine learning (ML) technologies to transform big data and human …

How to make DevSecOps stick with developers
While DevOps culture has brought innovation to the industry and transformed the way software is developed, it’s arguably an outdated concept. The truth is that DevOps has …

Three signs your SOC is ready for XDR
Over the past year, there’s been a movement growing in the industry towards Extended Detection and Response, or XDR. While a few offerings represent broad portfolio …

What’s at stake in the Computer Fraud and Abuse Act (CFAA)
Two weeks ago, the Supreme Court heard oral arguments in Van Buren vs. United States, the landmark case over the Computer Fraud and Abuse Act (CFAA). Nathan Van Buren, the …

CPRA hints at the future of cybersecurity and privacy
One of the most notable ballot propositions impacting the privacy and cybersecurity world during the US 2020 election was the passage of the California Privacy Rights Act …

2021 predictions: The rise of cyber resilience
Each year seems to come with more cyber threats, “bad actors,” ransomware and data breaches. The security industry is on fire right now with technology providers continuing to …

Achieving digital transformation by overcoming identity fatigue
Conversations about digital transformation (DX) are so frequent and pervasive that we tend to lose track of how incomplete they can be. You might think that DX only concerns …

Combating the virtual and physical threats banks face
The banking sector has always been at the center of criminal attention. Today, banks must contend with near-constant cyber attacks from organized criminal gangs, as well as …

How can companies secure a hybrid workforce in 2021?
This has been a uniquely transformative year. Prompted by a global pandemic, we’ve been forced to change many things about how we live, work, and relate. For most businesses, …

Techno-nationalism isn’t going to solve our cyber vulnerability problem
Against the backdrop of intensifying cyber conflicts and the rapidly evolving threat landscape, a new wave of techno-nationalism is being trumpeted from almost every corner of …

Six cryptographic trends we’ll see next year
2020 was a “transformative” year, a year of adaptability and tackling new challenges. As we worked with organizations to deploy mission-critical data security, cryptography …
Featured news
Resources
Don't miss
- ScamAgent shows how AI could power the next wave of scam calls
- Where security, DevOps, and data science finally meet on AI strategy
- Can AI make threat intelligence easier? One platform thinks so
- Hundreds of Salesforce customer orgs hit in clever attack with potentially huge blast radius
- 300k+ Plex Media Server instances still vulnerable to attack via CVE-2025-34158