secure

How to secure your data as you go digital

To scale more efficiently and serve customers better, companies are moving more workloads and services to the cloud. According to IDG, 37 percent of companies are increasing …

Black Hat

Security trends to follow at Black Hat USA 2019

Black Hat USA 2019 is just around the corner! Selecting which sessions to attend from among the conference’s jam-packed catalog of training sessions, panels and briefings can …

AI

The rise of biometrics and passwordless security

Whether you realize it or not, our current era of mobile and cloud computing can be defined, both positively and negatively, by shared secrets. Shared secrets — passwords, …

industrial

The need for scalable OT security

As manufacturers and other industrial network owners are becoming more security conscious, they are coming up against security performance issues. Operational Technology (OT) …

Face paint

Tricking attackers through the art of deception

In cybersecurity, deception is redundant if it cannot fulfill its critical aim – to misdirect, confuse, and lure attackers into traps and dead-ends. It is the art of tricking …

burn

How DNS firewalls can burn security teams

It’s easy to see how DNS firewalls could have thwarted 33% of data breaches. For most IT and security teams, DNS has been an afterthought. Or, worse, not even that. The …

5G

The true potential of 5G for businesses

Technology is transforming our world beyond recognition and both public and private sector organizations are at a tipping point where they must embrace digital transformation …