Lessons from the Snowflake breach: SaaS security needs collaboration Guy Guzner August 15, 2024 Companies should align their SaaS security strategies with their service providers so that everyone is clear on what role they should play in mitigating threats. Read More
Supply chain cybersecurity and modern-day cargo theft Mike Ehrich August 15, 2024 As cargo theft becomes increasingly sophisticated, companies must adapt. Read More
Reclaim the information advantage from cyber criminals Nick Ascoli August 14, 2024 Attackers don’t have to have the information advantage — security professionals can regain and maintain the information advantage.Read More
75% of security leaders say threat intelligence is most valuable skill Security Staff August 14, 2024 AI readiness was analyzed in a report by Pluralsight. The findings show that 56% of security professionals are concerned about AI-powered threats. Read More
How to transform the defender’s dilemma into the defender’s advantage Lenny Zeltser August 14, 2024 The notion that cybersecurity defenders are at an inherent disadvantage — the so-called defender's dilemma — is incorrect and counterproductive. Read More
Hybrid workplace vulnerabilities: Ways to promote online safety Aidan Simister August 14, 2024 While remote working offers many benefits to employees, it can be a real headache for employers trying to secure their digital assets. Read More
Calling for backup: The importance of disaster recovery Brent Torre August 13, 2024 The number one mistake a business could make is assuming that they won’t be the victim of a ransomware attack.Read More
Network security implications of the Great Resignation Tracy Collins August 13, 2024 What are the network security implications of the Great Resignation, and how can out-of-band management help?Read More
FTC works on AI fraud prevention Security Staff August 13, 2024 The Federal Trade Commission (FTC) is working on protections against artificial intelligence (AI) based fraud.Read More
Why insider attacks are indicative of a need for security convergence Ellie Gibson August 13, 2024 In order to use security convergence to combat the growing threat of insider attacks, one must first understand key facts about the issue. Read More