Analyses

data analytics algorythym chart progress digital solarseven getty
6 network packet analysis data binary world

bridging a gap

How organizations are bridging the cyber-risk management gap

To bridge the cyber-risk management gap, organizations plan to get CISOs more involved with the business, focus on data security, hire staff, and provide more security awareness training.

FireMon network security policy management

Must-have features in a modern network security architecture

Form factors and use cases are changing, so network security must be more comprehensive, intelligent, and responsive than ever before.

security internet network encryption privacy padlock

Cybersecurity pros' haphazard participation in data privacy raises concern

Limited training and unclear roles/responsibilities for cybersecurity teams restrict the effectiveness of data privacy programs.

Cisco

Security shines at Cisco Live

Cisco's security team highlighted market results, integrated portfolio, and future plans, but there is still some work ahead.

cwan 018 thumb2
video

What is sharding? It's one way blockchain can scale

Sharding is one of several methods being tested by start-ups, developers and current blockchain platforms to see if it can help developers finally address blockchain's scalability problem.

overwhelmed man stressed analytics information overload

The most stressful aspects of being a cybersecurity professional

Keeping up with IT, educating users, and working with the business top the list of the most stressful things of being a cybersecurity professional.

vulnerable breach cyberattack hacker

Cybersecurity professionals are no match for cyber-adversaries

In the battle against hackers, cyber-adversaries have an advantage over cyber-defenders, new research from ESG and ISSA finds.

cybersecurity ts

Is the cybersecurity skills shortage getting worse?

New research indicates that things are not improving for filling the demand for cybersecurity skills. The ramifications are widespread.

security risk - phishing / malware / social engineering

9 types of malware and how to recognize them

Think you know your malware? Here's a refresher to make sure you know what you're talking about — with basic advice for finding and removing malware when you've been hit

mobile security threat detection

5 threat detection and response technologies are coming together

Organizations use too many disparate point tools to detect and respond to cyber threats in a timely manner. As a result, CISOs want tight integration and interoperability across five cybersecurity technologies.

binary code, magnifying lens, skull and crossbones

The growing demand for managed detection and response (MDR)

Threat detection/response is a high priority, but many organizations don’t have the staff or skills to perform these tasks alone. This translates into a growing managed detection and response (MDR) market.

endpoint protection gears

Endpoint security is consolidating, but what does that mean?

Organizations seeking tightly-integrated endpoint security solutions must determine how far they want to go.

security protection / defenses / protocols

Vulnerability management woes continue, but there is hope

Prioritizing fixes, workflows, and timely patching are just some of the challenges organizations face, but advanced data analytics may help with vulnerability management.

risk assessment - safety analysis - security audit

Cyber risk management challenges are impacting the business

Organizations struggle with continuous monitoring, tracking the threat landscape, identifying sensitive data flows, and communication between cybersecurity and business executives.

Load More