How industrial IoT is forcing IT to rethink networks
| | | | | | | | | | | | | | | | | | | | |

How industrial IoT is forcing IT to rethink networks

Industrial IoT is forcing more networks to the edge and away from central data centers. This is what IT should do now. Network topology has been … See all articles in Insights

A new age of disaster recovery planning for SMEs
| | | | | | | | | | | | | | | | | | | | |

A new age of disaster recovery planning for SMEs

According to Accenture, more than one-third of cyberattacks are aimed at small businesses, but only 14% of them are prepared to defend themselves.1 … See all articles in Insights

Enterprise ransomware preparedness improving but still lacking
| | | | | | | | | | | | | | | | | | | | |

Enterprise ransomware preparedness improving but still lacking

An Enterprise Strategy Group survey found enterprises are making strides in ransomware preparedness, but work remains to prevent and mitigate attacks. … See all articles in Insights

3 cloud security posture questions CISOs should answer
| | | | | | | | | | | | | | | | | | | | |

3 cloud security posture questions CISOs should answer

As cloud adoption continues to accelerate, CISOs must help IT and cybersecurity teams keep pace with evolving cloud markets, especially when it comes … See all articles in Insights

Cloud security is the new battle zone
| | | | | | | | | | | | | | | | | | | | | | |

Cloud security is the new battle zone

Don’t look now. More than 80% of organizations have experienced a security incident on a cloud platform during the past 12 months according to … See all articles in Insights

IoT: The huge cybersecurity blind spot that’s costing millions – Help Net Security
| | | | | | | | | | | | | | | | | | | | | |

IoT: The huge cybersecurity blind spot that’s costing millions – Help Net Security

In many ways, IoT has made our lives easier. We are technologically connected in ways we never thought possible. But organizations need to be aware of … See all articles in Insights

SBOMs: What they are and why organizations need them
| | | | | | | | | | | | | | | | | | | | |

SBOMs: What they are and why organizations need them

In the continuously rippling wake of cyberattacks, hacks and ransomware, organizations want — and need — to clean up their software supply chains. In this, they are increasingly turning to a valuable visibility tool: the software bill of materials (SBOM). As noted by the Cybersecurity and … See all articles in Insights

How to measure cyber risk: The basics of cyber risk quantification
| | | | | | | | | | | | | | | | | | | | | |

How to measure cyber risk: The basics of cyber risk quantification

Today’s organizations rely on metrics more than ever before. Yet when it comes to metrics, few are as important as cyber risk. Having the ability to measure cyber risks is critical for making informed security investments, and implementing the controls necessary to minimize the risk of a data … See all articles in Insights

Cloud security risks remain very human
| | | | | | | | | | | | | | | | | | | | | |

Cloud security risks remain very human

Talk about cloud security and you’re likely to discuss provider-focused issues: not enough security, not enough auditing, not enough planning. … See all articles in Insights

Challenges of securing a software supply chain
| | | | | | | | | | | | | | | | | | | | | |

Challenges of securing a software supply chain

A major area of concern for IT security teams is how to tackle the challenges posed by the increasing use of third-party platforms and services. The … See all articles in Insights