Posts From administrator

Back to homepage
Software

Cyber threats continue to evolve, but security teams remain confident

Coming off of a year of major data breaches making headline news, it’s easy to draw the conclusion that security teams are losing the cybersecurity battle, a DomainTools survey reveals. Click here to view

Hardware/Network

Create secure IoT products: Enable security by design

Good practices for IoT security, with a particular focus on software development guidelines for secure IoT products and services throughout their lifetime have been introduced in a report by ENISA. Click here

Cloud

Monitoring multi-cloud environments

In today’s fast-growth, faster-results market, customers expect applications to be consistently available and up-to-date — which is often easier said than done. Meeting that demand often involves migrating to the

Industry Insights

What We Can Learn From This Year’s National Cybersecurity Awareness Month

National Cybersecurity Awareness Month (NSCAM) has been an annual fixture since October 2003. The goal of the last 16 years has been to raise awareness of the importance of security

Artificial Intelligence

Is Machine Learning Really AI?

One of the downsides to the recent revival and popularity of Artificial Intelligence (AI) is that we see a lot of vendors, professional services firms, and end users jumping on

Software

It’s Time To Plan For A Future Beyond Passwords

Passwords are a problem. They’re hard to remember, they’re easily stolen, they’re published on the dark web and there are too many of them. According to a study by password management company

Software

Why Software Developers Are The True Cybersecurity Threat

Software exists to make things we want to repeat — in the exact same manner, time after time — easy to access. When I press the “W” key, I expect

Hardware/Network

Cyber Risk Increases at All Layers of the Corporate Network

The growing popularity of cloud and DevOps environments will continue to drive business agility while exposing organizations, from enterprises to manufacturers, to third-party risk. Click here to view original webpage at www.helpnetsecurity.com

IT Compliance

Inadequate Data Sanitization Puts Enterprises at Risk of Breaches & Compliance Failures

Global enterprises’ overconfidence and inadequate data sanitization are exposing organizations to the risk of data breach, at a time when proper data management should be at the forefront of everything they

IT Compliance

Driving Collaboration Between Security & IT Ops Teams is a Major Challenge

Strained relationships between security and IT ops teams leave businesses vulnerable to disruption, even with increased spending on IT security and management tools, a Tanium research reveals. Click here to