Cyber insurance getting harder to obtain
| | | | | | | | | | | | | | | | | | | |

Cyber insurance getting harder to obtain

The number of organisations that will either be unable to afford cyber insurance, end up with insufficient coverage, or be refused a policy … See all articles in Insights

SBOMs: What they are and why organizations need them
| | | | | | | | | | | | | | | | | | | | |

SBOMs: What they are and why organizations need them

In the continuously rippling wake of cyberattacks, hacks and ransomware, organizations want — and need — to clean up their software supply chains. In this, they are increasingly turning to a valuable visibility tool: the software bill of materials (SBOM). As noted by the Cybersecurity and … See all articles in Insights

New to the cloud? Here are top tips for getting started
| | | | | | | | | | | | | | | | | | | |

New to the cloud? Here are top tips for getting started

This is your go-to resource for XaaS, AWS, Microsoft Azure, Google Cloud Platform, cloud engineering jobs, and cloud security news and tips. See all articles in Insights

Cloud security risks remain very human
| | | | | | | | | | | | | | | | | | | | | |

Cloud security risks remain very human

Talk about cloud security and you’re likely to discuss provider-focused issues: not enough security, not enough auditing, not enough planning. … See all articles in Insights

Properly securing APIs is becoming increasingly urgent – Help Net Security
| | | | | | | | | | | | | | | | | | | | |

Properly securing APIs is becoming increasingly urgent – Help Net Security

Imperva released a new study that uncovers the rising global costs of vulnerable or insecure APIs. The analysis of nearly 117,000 unique … See all articles in Insights

Challenges of securing a software supply chain
| | | | | | | | | | | | | | | | | | | | | |

Challenges of securing a software supply chain

A major area of concern for IT security teams is how to tackle the challenges posed by the increasing use of third-party platforms and services. The … See all articles in Insights

40% of enterprises don’t include business-critical systems in their cybersecurity monitoring – Help Net Security
| | | | | | | | | | | | | | | | | | | | |

40% of enterprises don’t include business-critical systems in their cybersecurity monitoring – Help Net Security

Logpoint has announced findings from a recent poll to uncover the security and cost implications enterprises face with their existing IT … See all articles in Insights

Why a cloud-native approach is critical to digital transformation
| | | | | | | | | | | | | | | | | | | | |

Why a cloud-native approach is critical to digital transformation

The cloud-native approach is about more than taking your application as it exists today and making it work in the cloud. Cloud computing has proven itself a viable technology model in this first phase of its life cycle. The pandemic accelerated cloud adoption by three to five years and helped … See all articles in Insights

Report: 80% of cyberattack techniques evade detection by SIEMs
| | | | | | | | | | | | | | | | | | | | | |

Report: 80% of cyberattack techniques evade detection by SIEMs

According to a new report by CardinalOps, on average, enterprise SIEMs are missing detections for 80% of all MITRE ATT&CK techniques and only address five of the top 14 ATT&CK techniques employed by adversaries in the wild. CardinalOps’ second annual report on the state of SIEM detection risk … See all articles in Insights

3 Ways We Can Improve Cybersecurity
| | | | | | | | | | | | | | | | | | | | |

3 Ways We Can Improve Cybersecurity

To better manage risks, companies can concentrate on resilience, sharing information to protect from cyber threats, and making the cybersecurity tent … See all articles in Insights