GUEST ESSAY: NIST’s Cybersecurity Framework update extends best practices to supply chain, AI

GUEST ESSAY: NIST’s Cybersecurity Framework update extends best practices to supply chain, AI

The National Institute of Standards and Technology (NIST) has updated their widely used Cybersecurity Framework (CSF) — a free respected landmark guidance document for reducing cybersecurity risk. Related: More background on CSF ...
GUEST ESSAY: Essential cyber hygiene practices all charities must embrace to protect their donors

GUEST ESSAY: Essential cyber hygiene practices all charities must embrace to protect their donors

Charities and nonprofits are particularly vulnerable to cybersecurity threats, primarily because they maintain personal and financial data, which are highly valuable to criminals. Related: Hackers target UK charities Here are six tips ...
GUEST ESSAY: Everything you should know about the cybersecurity vulnerabilities of AI chatbots

GUEST ESSAY: Everything you should know about the cybersecurity vulnerabilities of AI chatbots

AI chatbots are computer programs that talk like humans, gaining popularity for quick responses. They boost customer service, efficiency and user experience by offering constant help, handling routine tasks, and providing prompt ...
GUEST ESSAY: Why internal IT teams are ill-equipped to adequately address cyber risks

GUEST ESSAY: Why internal IT teams are ill-equipped to adequately address cyber risks

| | Guest Blog Post, Top Stories
Every industry is dealing with a myriad of cyber threats in 2024. It seems every day we hear of another breach, another scam, another attack on anything from a small business to ...
GUEST ESSAY: Best practices to shrink the ever-present risk of Exchange Server getting corrupted

GUEST ESSAY: Best practices to shrink the ever-present risk of Exchange Server getting corrupted

| | Guest Blog Post, Top Stories
Even in the cloud era, Microsoft Exchange Server remains a staple business communications tool across the globe. Related: The need for robust data recovery policies. One critical issue faced by organizations that ...
GUEST ESSAY: The case for using augmented reality (AR) and virtual reality (VR) to boost training

GUEST ESSAY: The case for using augmented reality (AR) and virtual reality (VR) to boost training

| | Guest Blog Post, Top Stories
Augmented reality (AR) and virtual reality (VR) technologies provide intriguing opportunities for immersive and interactive experiences in cybersecurity training. Related: GenAI’ impact on DevSecOps Here’s  how these technologies can bridge learning gaps ...
GUEST ESSAY: Leveraging DevSecOps to quell cyber risks in a teeming threat landscape

GUEST ESSAY: Leveraging DevSecOps to quell cyber risks in a teeming threat landscape

| | Guest Blog Post, Top Stories
In today’s digital landscape, organizations face numerous challenges when it comes to mitigating cyber risks. Related: How AI is transforming DevOps The constant evolution of technology, increased connectivity, and sophisticated cyber threats ...
GUEST ESSAY: Adopting an ‘assume-breach mindset’ to defend company networks in 2024

GUEST ESSAY: Adopting an ‘assume-breach mindset’ to defend company networks in 2024

| | Guest Blog Post, Top Stories
Professionals are constantly seeking ways to fortify their defenses against malicious threats. One approach gaining traction is the “assume-breach mindset.” This proactive approach is designed to better prepare organizations for inevitable security ...
GUEST ESSAY: Taking proactive steps to heal the planet — by reducing the impact of video streaming

GUEST ESSAY: Taking proactive steps to heal the planet — by reducing the impact of video streaming

| | Guest Blog Post, Top Stories
Most folks don’t realize that the Internet contributes more than 3.7 percent of global greenhouse gas emissions. Related: Big data can foster improved healthcare Within that, video represents over 80 percent of ...
GUEST ESSAY: Steps to leveraging ‘Robotic Process Automation’ (RPA) in cybersecurity

GUEST ESSAY: Steps to leveraging ‘Robotic Process Automation’ (RPA) in cybersecurity

| | Guest Blog Post, Top Stories
In cybersecurity, keeping digital threats at bay is a top priority. A new ally in this battle is robotic process automation (RPA.) This technology promises to simplify tasks, boost accuracy and quicken ...