Opinions
How to select a DLP solution: 9 unusual considerations
Data loss prevention systems have become more complex, and each has evolved differently. Here’s how to select a DLP system based on required functionality and its real-life ability to prevent data leaks.
The most important cybersecurity topics for business executives
Data privacy, current cyberthreats, and cybersecurity culture and training top the list, but are these the right priorities?
3 ways to speak the board's language around cyber risk
Framing the cyber risk conversation in ways that resonate with the board will help close the chasm between cyber risk and enterprise objectives.
AWS chief Andy Jassy gets top job at Amazon as CEO Bezos steps down
The surprise announcement that Jeff Bezos will leave later this year and hand over the reins to AWS leader Andy Jassy marks a remarkable rise for Jassy. He began as a marketing manager in 1997 and started AWS in 2003.
Why you're probably doing endpoint security all wrong
The traditional combination of username and password to secure company devices and systems is outdated and could be putting your business at risk. Employing an AI based continuous identity management system could eliminate nearly all...
4 ways security has failed to become a boardroom issue
New research finds that despite being more engaged with cybersecurity, business executives and board members continue to view cybersecurity as a technology domain rather than a business concern.
17 types of Trojans and how to defend against them
Trojan malware comes in many different types, but all require a user action to initiate.
5 things to look for in an XDR solution
The XDR market is hot, with vendors large and small jumping on the bandwagon. Here are 5 key capabilities to look for when evaluating XDR solutions.
3 security career lessons from 'Back to the Future'
You don't need to be able to predict the future to have a successful security career, but you had darned well better be able to learn from the past.
4 ways attackers exploit hosted services: What admins need to know
Attackers are either targeting admins for hosted services with phishing campaigns or exploiting mistakes made when setting them up. Here's what to watch out for.
SolarWinds hack is a wakeup call for taking cybersecurity action
Many questions are yet to be answered as the investigation and response continues, but one thing is clear: managing supply chain risks requires a level of sophistication similar to that of the attackers.
Data security vs data privacy – they’re not the same thing
Data security and data privacy are both necessary to completely protect corporate data assets. But most companies spend most of their time on the former and much less on the latter.
Why 2021 will be a big year for deception technology
New use cases, MITRE Shield support, and greater awareness will drive market growth and penetration.
Why you should consider outsourcing DLP
Data loss due to insider threats is a growing problem, but many companies don't have the resources to support an in-house data loss prevention system. Outsourcing might be the answer.
Protecting the supply chain in an era of disruptions
Supply chain problems encountered during the COVID-19 pandemic brought continuity planning out of the shadows and into the boardroom.
Beyond the firewall: Intrusion Detection Systems
Firewalls are so 2000s. With your "office" now scattered over homes everywhere, you need a new way of protecting your office from network threats and that's IDSs.
What is the dark web? How to access it and what you'll find
The dark web is part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed.
5 open source intrusion detection systems for SMBs
If you don’t have a lot of budget at your disposal, these open-source intrusion detection tools are worth a look.
-
White Paper
-
Sponsor Article
Sponsored -
Video/Webcast
Sponsored -
White Paper
-
White Paper
BrandPosts
Learn more-
Sponsored by CIS
-
Sponsored by Hewlett Packard
-
Sponsored by ReliaQuest