Bolstering defenses amid evolving threats & cyber pro burnout Rick McElroy February 2, 2023 Cybersecurity is a continuous effort because, as systems evolve, so do attackers; however, best practices can bolster cybersecurity posture.Read More
Defense-in-depth protects against known and unknown cyber threats Gerry Grealish February 1, 2023 Addressing the challenges of web app cyberattacks means combining isolation-based protection with detection-based response, right from the start.Read More
Fighting security fatigue with proper training reduces cyber risks Matt Lindley January 31, 2023 As cyberattacks and data breaches increase, employees must be capable of identifying and preventing cyberattacks. The right kind of training can help.Read More
The importance of keeping backup data safe from cybercriminals Ahsan Siddiqui January 30, 2023 Immutability and air gapping provide effective ways to outsmart cybercriminals and defend against ransomware attacks that target vital backup data.Read More
Building a stronger bond between IT and physical security Roy Dagan January 27, 2023 Physical security and IT teams need to work together when it comes to securing organizational networks and physical security technology.Read More
5 strategies for hotel & casino worker safety Joseph Heinzen January 27, 2023 Hospitality security leaders should focus on emergency plans, incident reporting and employee communication when looking to improve worker safety.Read More
Protecting data centers by layering physical security entrances Derek Nilsen January 27, 2023 Physical security helps prevent unauthorized persons from entering data facilities to steal intellectual property or harm people or property. Read More
Securing high-value digital transactions improves user satisfaction Will LaSala January 26, 2023 Companies that prioritize end-to-end security across every digital transaction will set their company up for success and protect customers. Read More
Water storage is under cyber threat Robert Nawy January 24, 2023 Protecting critical infrastructure from cyberattacks continues to grow in importance, and the next sector of interest is water supply and storage. Read More
Shadow IT risk: A dangerous connection Andy Ognenoff Brian Soby January 23, 2023 The connected nature of today’s IT ecosystems increases the risks associated with shadow IT, the act of using unapproved third-party apps and software. Read More