Why authentication is good medicine for today’s data breach epidemic Yves Audebert June 6, 2023 Even though the data breach threat has been present for decades, many organizations still don’t have a great handle on how to prevent it.Read More
Automation is no longer the future of cybersecurity: It’s the present Marc van Zadelhoff June 5, 2023 It’s no secret that we’re facing a critical cybersecurity talent shortage. Despite persistent outcry from security leaders and experts, it’s only getting worse.Read More
What CISOs need to know to mitigate quantum computing risks David Bader June 2, 2023 Although quantum computing can lead to positive and transformative solutions, the development also poses a significant threat to cybersecurity. Read More
Four testing priorities for stronger API security Frank Catucci June 2, 2023 For a modern digital enterprise, the ubiquity, vulnerability and obscurity of APIs creates a perfect storm when it comes to application security.Read More
Simplifying complexity for a secure hybrid multicloud environment Mignona Cote June 2, 2023 Managing cybersecurity threats can seem overwhelming under the best of circumstances, and today’s threat landscape has never been more complex.Read More
How organizations can protect against phishing campaigns Tonia Dudley June 1, 2023 With cybersecurity threats on the rise, there are two crucial steps an organization can take to avoid falling victim to a credential phishing attack.Read More
Non-human identities: Secure them now, not later Idan Gour June 1, 2023 Now is the time to secure non-human identities — access tokens, integrations and authentication tools — to prevent future cyberattacks.Read More
How security teams should respond to sophisticated ransomware attacks Carlos Arnal Cardenal May 31, 2023 As a constantly evolving form of malware, ransomware attacks only grow in sophistication and find new ways to steal business-critical data. Read More
The 5 pillars of cloud security for data storage Faye Ellis May 31, 2023 Rather than debating the ways that the cloud is or isn’t inherently secure, leaders should question whether they are using the cloud securely. Read More
The growing multifactor authentication imperative Jay Martin May 30, 2023 Using standard "enter your username and password" login credentials for any cloud-based resources is a security nightmare for IT teams. Read More