Opinions
Sponsor Podcast in partnership with Microsoft
Episode 4: Reduce SOC burnout
Episode 4 - Listen to the podcast to learn more about the expanding threat landscape and how security leaders can reduce SOC burnout and enable security teams to be proactive and preventive threat hunters with a modern threat...
The race to secure 5G
The arrival of 5G technology introduces a new era of digital transformation. Security can't be an afterthought.
Sponsor Podcast in partnership with Microsoft
Episode 3: The Zero Trust Model
Episode 3: In this episode, we look at the steps organizations are taking toward Zero Trust and provide recommendations for making the most of a Zero Trust model to reduce risk while helping employees be more productive, regardless...
Why XDR must include MDR
Technology alone isn't enough; organizations need help with security operations.
XDR is coming: 5 steps CISOs should take today
Beyond threat detection and response, CISOs should think of XDR as an opportunity to modernize the SOC, automating processes, and improving staff productivity. Here's your XDR game plan for 2021.
The .NET patch failure that wasn’t
This month’s patch updates from Microsoft have caused few problems, and though there were some issues related to .NET, even those have been scattered.
How to select a DLP solution: 9 unusual considerations
Data loss prevention systems have become more complex, and each has evolved differently. Here’s how to select a DLP system based on required functionality and its real-life ability to prevent data leaks.
The most important cybersecurity topics for business executives
Data privacy, current cyberthreats, and cybersecurity culture and training top the list, but are these the right priorities?
3 ways to speak the board's language around cyber risk
Framing the cyber risk conversation in ways that resonate with the board will help close the chasm between cyber risk and enterprise objectives.
AWS chief Andy Jassy gets top job at Amazon as CEO Bezos steps down
The surprise announcement that Jeff Bezos will leave later this year and hand over the reins to AWS leader Andy Jassy marks a remarkable rise for Jassy. He began as a marketing manager in 1997 and started AWS in 2003.
Why you're probably doing endpoint security all wrong
The traditional combination of username and password to secure company devices and systems is outdated and could be putting your business at risk. Employing an AI based continuous identity management system could eliminate nearly all...
4 ways security has failed to become a boardroom issue
New research finds that despite being more engaged with cybersecurity, business executives and board members continue to view cybersecurity as a technology domain rather than a business concern.
17 types of Trojans and how to defend against them
Trojan malware comes in many different types, but all require a user action to initiate.
5 things to look for in an XDR solution
The XDR market is hot, with vendors large and small jumping on the bandwagon. Here are 5 key capabilities to look for when evaluating XDR solutions.
3 security career lessons from 'Back to the Future'
You don't need to be able to predict the future to have a successful security career, but you had darned well better be able to learn from the past.
4 ways attackers exploit hosted services: What admins need to know
Attackers are either targeting admins for hosted services with phishing campaigns or exploiting mistakes made when setting them up. Here's what to watch out for.
SolarWinds hack is a wakeup call for taking cybersecurity action
Many questions are yet to be answered as the investigation and response continues, but one thing is clear: managing supply chain risks requires a level of sophistication similar to that of the attackers.
Data security vs data privacy – they’re not the same thing
Data security and data privacy are both necessary to completely protect corporate data assets. But most companies spend most of their time on the former and much less on the latter.
-
Video/Webcast
Sponsored -
eBook
Sponsored -
eBook
Sponsored -
White Paper
-
White Paper
BrandPosts
Learn more-
Sponsored by Sophos
-
Sponsored by CIS
-
Sponsored by Fortinet