How attackers are pairing MFA manipulation & social engineering tricks Sinan Eren February 15, 2023 The right combination of training, security policies & zero trust technology can provide protection from any credential-based attack vector. Read More
It's time to prepare for quantum computing’s impact on DNS security Peter Lowe February 14, 2023 When quantum computing makes its entrance, it could eviscerate online communications. Cybersecurity efforts to prevent quantum attacks can’t wait.Read More
A human-first approach to minimizing insider threats Dale Killinger February 10, 2023 With business security as a top concern, there are steps and considerations security leaders can take to protect financial and intellectual assets. Read More
Three ways the hybrid workplace is transforming the security industry Rahul Ramakrishnan February 10, 2023 To sharpen incident response and build a safer work environment, security leaders are assessing the technology and policies of their organizations.Read More
Thwarting retail theft using AI technologies Ravi Annavajjhala February 10, 2023 Combating retail theft has always been a challenge. AI acceleration technologies can identify, monitor and alert organizations to theft problems. Read More
SAP cyber resilience is not a one-and-done procedure Christoph Nagy February 9, 2023 A continuous process for monitoring and addressing security issues within the SAP system ensures cybersecurity and business resilience. Read More
5 Minutes With 5 minutes with Duncan Greatwood — Securing remote access in critical infrastructure Joy LePree Anderson February 7, 2023 Security magazine sits down with Duncan Greatwood to discuss how the critical infrastructure and manufacturing sectors can bolster security for remote access. Read More
Why hackers are attacking healthcare more frequently? Jonathan Jesneck February 7, 2023 Attacks present challenges for the medical community. Governments and institutions must work together to create a secure environment for patient data.Read More
3 steps to lay the foundation for stronger healthcare managed defense John Whetstone February 6, 2023 Healthcare organizations must research their existing cybersecurity posture and establish strong internal processes at every level of the company.Read More
Transforming the multigenerational cybersecurity workforce Jeff Costlow February 3, 2023 As the digital economy grows, digital crime grows with it. Building a multigenerational workforce may be the solution to prevent a data breach. Read More