Organizations Should Move to an Identity-centric Approach Based on a Zero Trust Model
Hi, what are you looking for?
Organizations Should Move to an Identity-centric Approach Based on a Zero Trust Model
When it Comes to Information Security, 100 Percent Protection is Unattainable
Vulnerability management has historically been treated as an engineering exercise that is disconnected from how security flaws relate to the business and the actual...
The End User Community is at the Mercy of Security Researchers to Act Responsibly
The healthcare industry has experienced an onslaught of cyber-attacks over the last year, primarily driven by the fact that patient records are highly prized...
Organizations Are Struggling to Operationalize Their Knowledge of Risk
There’s no doubt, we’re living in a data and intelligence-driven world when it comes to enterprise security. The volume, velocity, and complexity of information...
The use of microservices and containers like Docker have led to a revolution in DevOps. Providing the agility that business have long awaited, these...
Cyber security and cyber threats are most often confused with cyber risk, and often used interchangeably, but they are worlds apart. What is the...
A few weeks ago, the World Economic Forum (WEF) met in Davos, Switzerland where an expert working group issued a report “Advancing Cyber Resilience:...
EMV Does Not Address More Sophisticated Cyber-attacks That Target Backend Systems Which Contain Card Holder Data
Machine Learning Speed Up Remediation, But Will it Ever be Able to Autonomously Protect Organizations Against Cyber-attacks?