
How do I select a remote workforce protection solution for my business?
Recent research shows almost three quarters of large businesses believe remote working policies introduced to help stop the spread of COVID-19 are making their companies more …

Organizations must rethink traditional IT strategy to succeed in the new normal
64% of IT pros are instilled with a new sense of confidence, despite contending with challenges such as reduced budgets, greater decision-making responsibilities, and longer …

What happens to funds once they have been stolen in a cyberattack?
SWIFT and BAE Systems published a report that describes the complex web of money mules, front companies and cryptocurrencies that criminals use to siphon funds from the …

Intelligent processes and tech increase enterprises’ competitiveness
Enterprises of the future will be built on a foundation of artificial intelligence (AI), analytics, machine learning, deep learning and automation, that are central to solving …

(ISC)² Exam Action Plan: Get your certification goals on track for success
Even the best-laid plans can go astray, that’s why we stand ready as ever to help you get your certification goals back on track for success. Every (ISC)² member started out …

September 2020 Patch Tuesday: Microsoft fixes over 110 CVEs again
On this September 2020 Patch Tuesday: Microsoft has plugged 129 security holes, including a critical RCE flaw that could be triggered by sending a specially crafted email to …

Popular Android apps are rife with cryptographic vulnerabilities
Columbia University researchers have released Crylogger, an open source dynamic analysis tool that shows which Android apps feature cryptographic vulnerabilities. They also …

Securing Active Directory accounts against password-based attacks
Traditional password-based security might be headed for extinction, but that moment is still far off. In the meantime, most of us need something to prevent our worst instincts …

Mapping the motives of insider threats
Insider threats can take many forms, from the absent-minded employee failing to follow basic security protocols, to the malicious insider, intentionally seeking to harm your …

Cybersecurity after COVID-19: Securing orgs against the new threat landscape
Picture this: An email comes through, offering new COVID-19 workplace safety protocols, and an employee, worn down by the events of the day or feeling anxious about their …

Global security appliance market revenue grew to $4.2B in Q2 2020
The total security appliance market delivered solid unit shipment and revenue growth in the second quarter of 2020 (2Q20), according to IDC. Worldwide revenue increased 7.5% …

Are today’s organizations ready for the data age?
67% of business and IT managers expect the sheer quantity of data to grow nearly five times by 2025, a Splunk survey reveals. The research shows that leaders see the …
Featured news
Resources
Don't miss
- Why app modernization can leave you less secure
- How AI agents reshape industrial automation and risk management
- How well do you know your remote IT worker?
- LlamaFirewall: Open-source framework to detect and mitigate AI centric security risks
- NIST proposes new metric to gauge exploited vulnerabilities