Industry Spotlight
6 Significant Cloud Security Threats
Organizations and businesses have had to turn to third-party cloud and managed security services to look for ways to bolster cybersecurity and shift from legacy to modern data platforms. However, the sudden ...
Manufacturers Take the Initiative in Home IoT Security
Not so long ago, the internet of things (IoT) was considered a futuristic technology to support the factories and cities of tomorrow. Today, many of us regularly experience the IoT in our ...
Identity Verification: Protecting Customer Data Across Borders
A single platform for international identity verification can help businesses onboard customers from across the globe, verify them in seconds and ensure compliance Today’s digital world creates opportunities for businesses to expand ...
XDR Has Promise – and a Fair Share of Risks
The security industry is often an alphabet soup of confusing acronyms—SIEM, SOAR, SASE—and the latest acronym du jour is XDR. At first glance, you may conflate it with terms such as NDR ...
Unifying Security and Applications Through Identity
Identity and security must be built into the overall enterprise IT ecosystem, not simply added on As enterprise perimeters disappear into borderless cyberspace, CISOs are struggling to protect their businesses, partners and ...
Hotels Remain a Prime Target for Hackers
Although all industries have felt the strain from COVID-19, the hotel sector has been particularly hard hit. As hotels move to bring occupancy rates up, they should use this time to examine ...
Why Next-Gen Firewalls Miss the Mark for Today’s Remote Workforce
For nearly three decades, next-gen firewalls (NGFWs) have proven to be essential perimeter-based security solutions, helping the enterprise network in the detection and blocking of malicious traffic. However, infosec pros are looking ...
Pandemic Waves Underscore Vulnerabilities in Cloud File Systems
As the second wave of COVID-19 hits and remote work increases again, the need for secure cloud file systems to share large volumes of data is increasingly important Remote work models, accelerated ...
One Step Ahead: Using Threat Hunting to Anticipate the Unknown
Threat-hunting is a way to stay one step ahead of cybercriminals, spotting unusual activity before damage occurs A cyberthreat could be lurking in any corner of an organization’s infrastructure. The complex networks ...
Tips From a Hacker to Keep Smartphones Safe
We can do many things using our mobile devices: hail a taxi, book a hotel, send and receive money, purchase goods online or in-store, chat and share media files, control other devices ...
