The growing demand for faster software delivery, using public cloud environments, microservices, and containers, has triggered a discussion on the role of security in...
Hi, what are you looking for?
The growing demand for faster software delivery, using public cloud environments, microservices, and containers, has triggered a discussion on the role of security in...
Since the introduction of computers, user names and passwords have been the primary method used for access control and authentication. However, as post-mortem analysis...
A Zero Trust Security Model Allows Organizations to Align Their Security Investments With What Works Best
While politicians and security experts are constantly warning about the risk of cyber-attacks, they rarely, if ever, mention the risks associated with the Internet...
Organizations Should Move to an Identity-centric Approach Based on a Zero Trust Model
When it Comes to Information Security, 100 Percent Protection is Unattainable
Vulnerability management has historically been treated as an engineering exercise that is disconnected from how security flaws relate to the business and the actual...
The End User Community is at the Mercy of Security Researchers to Act Responsibly
The healthcare industry has experienced an onslaught of cyber-attacks over the last year, primarily driven by the fact that patient records are highly prized...
Organizations Are Struggling to Operationalize Their Knowledge of Risk
There’s no doubt, we’re living in a data and intelligence-driven world when it comes to enterprise security. The volume, velocity, and complexity of information...
The use of microservices and containers like Docker have led to a revolution in DevOps. Providing the agility that business have long awaited, these...
Cyber security and cyber threats are most often confused with cyber risk, and often used interchangeably, but they are worlds apart. What is the...
A few weeks ago, the World Economic Forum (WEF) met in Davos, Switzerland where an expert working group issued a report “Advancing Cyber Resilience:...
EMV Does Not Address More Sophisticated Cyber-attacks That Target Backend Systems Which Contain Card Holder Data
Machine Learning Speed Up Remediation, But Will it Ever be Able to Autonomously Protect Organizations Against Cyber-attacks?
As New Technologies Infiltrate the Enterprise, Security Practitioners Must Apply a More Holistic Approach to Enterprise Risk Management
It’s No Longer Feasible to Manage Threats Individually, Given the Sheer Volume of Security Gaps That Exist.
Implementing a Zero Trust Model Represents a Dramatic Change and Requires a Well-planned Transition
Breaking down silos created by individual security products and streamlining collaboration between security and IT operations remains the biggest cyber risk management challenge facing...