Opinions

security posture / cybersecurity landscape / binary eye / locks / keyholes / firewall / gears
A man casts the shadow of an ominous hooded figure against a circuit-based wall.

podcast 3x16 2
Sponsor Podcast Microsoft

Episode 4: Reduce SOC burnout

Episode 4 - Listen to the podcast to learn more about the expanding threat landscape and how security leaders can reduce SOC burnout and enable security teams to be proactive and preventive threat hunters with a modern threat...

5G mobile wireless network

The race to secure 5G

The arrival of 5G technology introduces a new era of digital transformation. Security can't be an afterthought.

podcast 3x16 2
Sponsor Podcast Microsoft

Episode 3: The Zero Trust Model

Episode 3: In this episode, we look at the steps organizations are taking toward Zero Trust and provide recommendations for making the most of a Zero Trust model to reduce risk while helping employees be more productive, regardless...

puzzle pieces / network / connections / component parts of a whole / microservices

Why XDR must include MDR

Technology alone isn't enough; organizations need help with security operations.

mobile security / threat detection / traffic analysis

XDR is coming: 5 steps CISOs should take today

Beyond threat detection and response, CISOs should think of XDR as an opportunity to modernize the SOC, automating processes, and improving staff productivity. Here's your XDR game plan for 2021.

A hand activates the software update button in a virtual interface. [ update / patch / fix ]

The .NET patch failure that wasn’t

This month’s patch updates from Microsoft have caused few problems, and though there were some issues related to .NET, even those have been scattered.

An open padlock with green check mark allows data to flow freely [lax security/data loss prevention]

How to select a DLP solution: 9 unusual considerations

Data loss prevention systems have become more complex, and each has evolved differently. Here’s how to select a DLP system based on required functionality and its real-life ability to prevent data leaks.

high priority gauge

The most important cybersecurity topics for business executives

Data privacy, current cyberthreats, and cybersecurity culture and training top the list, but are these the right priorities?

sing yell announce microphone boy shout communicate perform by jason rosewell unsplash

3 ways to speak the board's language around cyber risk

Framing the cyber risk conversation in ways that resonate with the board will help close the chasm between cyber risk and enterprise objectives.

hand holding paper cloud for amazon web services logo

AWS chief Andy Jassy gets top job at Amazon as CEO Bezos steps down

The surprise announcement that Jeff Bezos will leave later this year and hand over the reins to AWS leader Andy Jassy marks a remarkable rise for Jassy. He began as a marketing manager in 1997 and started AWS in 2003.

green army soldier on a laptop keyboard

Why you're probably doing endpoint security all wrong

The traditional combination of username and password to secure company devices and systems is outdated and could be putting your business at risk. Employing an AI based continuous identity management system could eliminate nearly all...

square peg in a round hole / wooden block shapes toy

4 ways security has failed to become a boardroom issue

New research finds that despite being more engaged with cybersecurity, business executives and board members continue to view cybersecurity as a technology domain rather than a business concern.

trojan horse malware virus binary by v graphix getty

17 types of Trojans and how to defend against them

Trojan malware comes in many different types, but all require a user action to initiate.

detection radar computer bug threats identify breach  by the lightwriter kao studio getty

5 things to look for in an XDR solution

The XDR market is hot, with vendors large and small jumping on the bandwagon. Here are 5 key capabilities to look for when evaluating XDR solutions.

Australia  >  Sydney  >  Streetscape / vanishing-point perspective / path / future / progress

3 security career lessons from 'Back to the Future'

You don't need to be able to predict the future to have a successful security career, but you had darned well better be able to learn from the past.

cloud security data breach crime accessible

4 ways attackers exploit hosted services: What admins need to know

Attackers are either targeting admins for hosted services with phishing campaigns or exploiting mistakes made when setting them up. Here's what to watch out for.

Binary Russian flag

SolarWinds hack is a wakeup call for taking cybersecurity action

Many questions are yet to be answered as the investigation and response continues, but one thing is clear: managing supply chain risks requires a level of sophistication similar to that of the attackers.

data security / padlock / binary code / digital display

Data security vs data privacy – they’re not the same thing

Data security and data privacy are both necessary to completely protect corporate data assets. But most companies spend most of their time on the former and much less on the latter.

Load More