Tag "Cyber Security Strategy"

Back to homepage
Identity Theft

The Top Security Breaches in History

By Telemessage, Technology has indeed enabled companies of all sizes and nature to rethink and innovate the way they do business. Through the power of the internet, digital platforms, and

Industry Insights

60% of firms believe a major security event will hit in the next few years

Only 30 percent of 1,250 senior executives, management and security practitioners in the U.S., U.K. and Canada are confident their business will avoid a major security event in the coming

Software

Container strategies don’t take security seriously enough

Most organizations do not feel prepared to adequately secure cloud-native applications, despite the surging adoption of containers and Kubernetes, according to StackRox. Digging into the sources of concern over container

Industry Insights

Cybersecurity and ethical data management: Getting it right

Data can provide information, information can lead to insight and knowledge, and knowledge is power. It’s no wonder, then, that seemingly everybody in this modern, computerized world of ours loves

Software

Countering threats: Steps to take when developing APIs

High profile data breaches resulting from faulty APIs continue to make headlines. In the last few months alone, T-Mobile’s data breach resulted in hackers stealing personal data of more than

Industry Insights

How a ‘National Security Help Desk’ Could Secure Critical National Infrastructure

The implications are clear; nation-state actors are set to target critical national infrastructure (CNI) on a scale never previously seen. A recent report warned that 2018 would see many more such attacks

Industry Insights

Ensuring election integrity: The overlooked last mile of securing voter data

With 99 percent of America’s votes counted by computers, security experts agree that our elections remain extremely vulnerable for a cyberattack. Fourteen states are still using fragile voting equipment consisting of digital

Software

Companies implementing DevSecOps address vulnerabilities faster than others

A new study from CA Veracode includes promising signs that DevSecOps is facilitating better security and efficiency, and provides the industry with the company’s first look at flaw persistence analysis, which measures

Industry Insights

Stay Ahead of Security Threats: Focusing on Your High-Risk Assets

As your organization’s IT landscape expands and traditional boundaries dissolve, it can be difficult to identify high-risk devices, applications, and users in order to develop a remediation plan. Your enterprise

Hardware/Network

Safeguarding global critical networks now and in the future

Lior Frenkel is the CEO and co-founder of Waterfall Security Solutions, a provider of unidirectional security gateways, stronger-than-firewalls perimeter security solutions for industrial control networks and critical infrastructures. In this interview