Companies Place Cyber Security in the Spotlight
New research shows that cyber security is taking center stage at many organizations. A pessimistic way of looking at this would be to acknowledge that things have gotten so bad with breaches, malware, and other incidents that enterprises have no choice but to focus on security ... Read More
Shades of GDPR: Are You Ready for California’s New Privacy Law?
The implementation of the California Consumer Privacy Act of 2018 (CCPA) is just around the corner, but there are indications that many organizations might not be ready for the new data protection requirements ... Read More
Top Inherent Risks with Cloud Security
The Cloud Security Alliance (CSA), an organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, recently unveiled its “Top Threats to Cloud Computing: The Egregious Eleven,” a report that examines the risks inherent with cloud security ... Read More
Moving to the Cloud? Be Ready to Embrace Complexity
The Cloud Security Alliance (CSA), an organization that works to raise awareness about best practices for secure cloud computing environments, has been especially busy of late—churning out findings related to cyber security and the cloud ... Read More
Grappling with the Security Talent Shortage? Maybe Automation Can Help
It’s an issue that gnaws at many cyber security executives perhaps as much as the latest insidious threats: the ongoing security skills shortage. And recent research suggest that the prospects will not get better any time soon ... Read More
New Cyber Security Alliance Aims to Fight Back
There’s clearly a sense of combativeness building on the part of cyber security leaders, teams, and organizations worldwide. Weary of seeing cyber criminals and other bad actors break into networks and systems seemingly at will to steal sensitive data, they are taking steps to bolster the overall effectiveness of security ... Read More
Framework Aims to Enhance the Security of Software
Software is powering much of the world today, from the largest computing machines to the smallest devices that can fit on a computer chip. That means there is a greater opportunity than ever for security breaches. As any end user knows, even the highest quality software can come with vulnerabilities ... Read More
Strengthen Your Web App Defenses Using Behavioral Analysis and Attacker Deception
For many enterprises today, Web and cloud applications are critical components of the business. And for the ever-increasing number of companies conducting business online, they are the business ... Read More
How to Best Protect Applications in the Cloud
Organizations are moving more applications to the cloud as they look to reap benefits such as cost savings, easier scalability, and greater agility. Many of these business applications hold and exchange critical, highly sensitive data, and have therefore become prime targets for hackers and other cyber criminals looking to exploit ... Read More