Ransomware attacks have been hitting hard lately, with over half of organizations experiencing at least one this year, according to a recent study. Recovering data often means negoitating with cybercriminals, but why put an organization in such positio…Read More How do I select a data recovery solution for my business?
As demands on the compliance function grow more intense, Chief Compliance Officers (CCOs) must proactively embrace new leadership responsibilities for their role and reposition how their function is thought of among stakeholders, according to Gartner. …Read More What’s next on the agenda for Chief Compliance Officers?
The space community is growing rapidly and Microsoft’s Space team is developing capabilities and services to meet its needs for extended connectivity across the world, simulated digital space environments, and ways for dealing with the huge amoun…Read More How Microsoft is taking cloud-powered innovation beyond Earth with Azure Space
COVID-19 has increased organizational focus on third-party risk management (TPRM) for 83% of companies, a recent study reveals. Yet, only 40% of organizations report expanding their TPRM programs as a result. More concerning is that 44% of companies re…Read More How do I select a third-party risk management solution for my business?
In an almost exclusively mobile world and the increased usage of mobile devices to access corporate data, cybercriminals started taking advantage of the vulnerability of such devices. As a result, cyberattacks on mobile devices have skyrocketed. To sel…Read More How do I select a mobile threat defense solution for my business?
Active Directory (AD), a directory service developed by Microsoft for Windows domain networks, is most organizations’ primary store for employee authentication and identity management, and controls which assets / applications / systems a user has…Read More How to improve your organization’s Active Directory security posture
Since big data consists of structured and unstructured data which is constantly growing in size, common software doesn’t have the ability to process and manage it. That’s why choosing the right big data solution is essential to make a data-…Read More How do I select a big data solution for my business?
Google recently unveiled the next evolution of Google Workspace, including new security and privacy capabilities to help users take advantage of trusted, cloud-native collaboration. In this interview with Help Net Security, Karthik Lakshminarayanan, Sr…Read More A closer look at Google Workspace privacy and data security
Other than a traditional SOC (security operations center) model, which offers continuous system monitoring to improve an organization’s security posture, there is also a virtual SOC solution, which offers the same capabilities, but is a web-based…Read More How do I select a virtual SOC solution for my business?
An IT service management (ITSM) solution guarantees that IT processes and services are combined with the business goals of an organization, thus helping it thrive. To select a suitable ITSM solution for your business, you need to think about a variety …Read More How do I select an ITSM solution for my business?
Almost a decade ago, ransomware started becoming a prominent consumer problem, locking computers and threatening users with fines and jail time for supposedly downloading unlicensed software or child pornography. Not long after that cyber criminals swi…Read More Sophos XDR: Threat hunting through the entire security ecosystem
Digital transformation has been around for a while, but last year it accelerated its pace significantly. As organizations suddenly shifted to an almost exclusively digital world, the need to protect digital assets grew even more. One way to tackle thes…Read More How do I select a managed cybersecurity solution for my business?
In this interview with Help Net Security, Adam Bennett, CEO at Red Piranha, discusses Extended Detection and Response and their flagship product – Crystal Eye XDR. We’ve been hearing a lot about XDR in the past year. What is it, and what se…Read More Crystal Eye XDR: Protect, detect and respond to threats from a single unified platform
Kubestriker is an open-source, platform-agnostic tool for identifying security misconfigurations in Kubernetes clusters. It performs a variety of checks on a range of services and open ports on the Kubernetes platform, helps safeguard against potential…Read More Kubestriker: A security auditing tool for Kubernetes clusters
Data loss prevention (DLP) has become even more important in the last year. Since the pandemic has made companies shif to a remote workforce model, cybersecurity threats have become increasingly complex and data security even more fragile. Companies ne…Read More How do I select a DLP solution for my business?
After earning his master’s degree in computer science and working on the IT side of the business at a number of large financial services organizations, Bobby Balanchdran observed one interesting thing: the legal department in these organizations had be…Read More Chief Legal Officers face mounting compliance, privacy and cybersecurity obligations
A recent report predicts that home networks, remote working software and cloud systems will be at the center of a new wave of attacks in 2021. Cybercriminals in 2021 will particularly look to home networks as a critical launch pad to compromising corpo…Read More How do I select a network monitoring solution for my business?
The most significant barrier to achieving DevSecOps is the continued perception that “Sec” is not already a part of “Dev” and “Ops”, says James Arlen, CISO at cloud data platform provider Aiven. Also, the fact this needs to be explicitly called out is …Read More Tips for boosting the “Sec” part of DevSecOps
Digital rights management (DRM) is a method to protect copyrights for digital media. In a world where technology allows us to share and copy various media and files, it is important to prevent or restrict unauthorized modification or distribution. This…Read More How do I select a DRM solution for my business?