security

Security and COVID-19: Securing the New Normal

The year 2020 is likely to go down in history as one of the most memorable and pivotal periods in generations, due to the COVID-19 pandemic that has affected everyone and everything ...
Security Boulevard
Imperva Hackathon

Virtual Hackathon Generates Next Generation of Imperva Innovation

“How do we run a global hackathon amid a global pandemic?” That was my first thought when I began planning the 2020 Imperva Hackathon earlier this year. While the event is designed ...
MFA-Hacks-webinar2

Avert cyberattacks against MFA using FBI-recommended countermeasures [Webinar]

With the rise of remote work, multi-factor authentication (MFA) has become more essential than ever. MFA can be used to protect authentications happening on different resources like workstations, VPNs, and enterprise applications. MFA ...
DevSecOps

DevSecOps: 4 Reasons You Need One

Those familiar with the world of software and application development are probably aware of the concept of DevOps. But what about DevSecOps? DevSecOps essentially adds another layer to the process by combining ...
Security Boulevard

3 Ways to Prepare Your Enterprise’s Data Security for a Future of Advanced Attacks

One significant negative implication of technology’s continual evolution is proportional advancement in nefarious internet activities, particularly cyber attacks. The past few years have seen a rising sophistication in cyber attacks at levels ...
online learning

5 Ways to Protect Online Learning Environments

As most schools continue to provide online learning during COVID-19, here are some ways to keep students and systems protected Remote work has become a way of life for many office and ...
Security Boulevard

Life post-acquisition: A people-centric plan to get you total data security a lot faster

| | Data Security
Getting acquired can be an emotional rodeo. Some days are crazy excitement and others are heartache over the unknowns ahead. It’s natural – we’re human. I remember years ago sitting in a ...
Figure 1

Never Leave Your Cloud Database Publicly Accessible

| | Data Security
Introduction In cybersecurity, we often hear about best practices, one of the most important of which is never to open services that should be for internal use to public access. These are ...
remote work

Remote, Hybrid Work Need Better Data Security

2020 is a uniquely transformative year. Prompted by a global pandemic, we’ve been forced to change many things about how we live, work and relate. For most businesses, this means a rapid ...
Security Boulevard
remote workforce

Security Threats Targeting the Remote Workforce

Having a remote workforce has become more popular with the advancement of technology and the ease of working in the digital space. However, with a pandemic sweeping across the world, there has ...
Security Boulevard