Industry Spotlight

MS Teams: The Gateway Drug to Security Chaos

We all know the COVID-19 pandemic forced organizations to rapidly accelerate their adoption of collaboration solutions. For organizations already using…

2 months ago

A Return to Logs to Unjam the Security Deficit

Some years ago, during the renaissance of security information and event management (SIEM), security became log crazy. The hope was…

2 months ago

How the Past 6 Months Have Shaped ICS Risk

During the past year, there has been heightened awareness of the risks posed by industrial control system (ICS) vulnerabilities, with…

2 months ago

Ransomware’s Next Target: Backup Data

Ransomware is a big business today and getting bigger all the time. It is so profitable that organized crime and…

2 months ago

Beware of Zerologon Vulnerabilities in Windows Server

Researchers have new discovered a new Common Vulnerability & Exposure (CVE) called Zerologon. According to, Microsoft’s Security Update Aug. 11:…

2 months ago

How the Cloud Could Improve Vendor Access Management

At first, it may seem antithetical to consider deploying a vendor access management system in the cloud. After all, you…

2 months ago

Keeping HR Data Secure in a Time of Data Breaches

Risk management has never been more important, especially at a time when data breaches continue to increase. There are numerous…

2 months ago

How To Tackle the 5 Biggest Enterprise IoT Security Challenges

The proliferation of IoT devices, particularly in the workplace, has left businesses with a new set of security challenges to…

2 months ago

Securing DevOps Using Deception and Denial

As organizations increasingly utilize DevOps for software development and IT operations, DevOps environments have become a priority target for would-be…

2 months ago

Pandemic Pushes Security Analysts to the Brink

Even when times are good, security analysts working in Security Operations Centers (SOCs) are up against it. They must stay…

2 months ago