SMBs Orgs Want Help, but Cybersecurity Expertise Is Scarce
| | | | | | | | | | | | | | | | | | | |

SMBs Orgs Want Help, but Cybersecurity Expertise Is Scarce

Smaller firms are boosting cybersecurity budgets, but there’s a long way to go to address a deep lack of cyber preparedness among SMBs. See all articles in Insights

As GDPR Continues To Cross The Pond, You Should Get Your Feet Wet On Data Protection Issues
| | | | | | | | | | | | | | | | | | |

As GDPR Continues To Cross The Pond, You Should Get Your Feet Wet On Data Protection Issues

Remember GDPR? The General Data Protection Regulation thing from across the pond that inspires copycat bills in liberal wastelands like California? … See all articles in Insights

Insider attacks becoming more frequent, more difficult to detect – Help Net Security
| | | | | | | | | | | | | | | | | | |

Insider attacks becoming more frequent, more difficult to detect – Help Net Security

Insider threats are a top concern at organizations of all kinds; only 3% of respondents surveyed are not concerned with insider risk, according to … See all articles in Insights

10 steps every business can take to avoid a cybersecurity breach
| | | | | | | | | | | | | | | | | | |

10 steps every business can take to avoid a cybersecurity breach

Businesses that survive cyberattacks understand that breaches are inevitable. That’s a strong motivator to make cyber-resilience and business recovery a core part of their DNA. CISOs and IT leaders tell VentureBeat that taking steps beforehand to be more resilient in the face of disruptive and … See all articles in Insights

Passwordless Authentication: What It Is and Why You Need It ASAP
| | | | | | | | | | | | | | | | | | | |

Passwordless Authentication: What It Is and Why You Need It ASAP

The cybersecurity industry has a vision for a more secure future—one that involves getting rid of passwords. I’m sick of passwords. They’re somehow … See all articles in Insights

50% of orgs report experiencing data breaches due to exposed API secrets
| | | | | | | | | | | | | | | | | | |

50% of orgs report experiencing data breaches due to exposed API secrets

API vulnerabilities are a serious issue that can’t be overlooked. Just one API vulnerability led to the breach of 5.4 million Twitter users’ data, and cybercriminals are well aware that all they need to gain access to an organization’s personally identifiable information (PII) is to harvest the … See all articles in Insights

Why Businesses Need to Think Like Hackers This Year
| | | | | | | | | | | | | | | | | | |

Why Businesses Need to Think Like Hackers This Year

Security professionals must update their skill sets and be proactive to stay ahead of cybercriminals. It’s time to learn to think and act like an … See all articles in Insights

How to Erase Data Securely From Hard Drives and SSDs, Including NVMe
| | | | | | | | | | | | | | | | | | | |

How to Erase Data Securely From Hard Drives and SSDs, Including NVMe

Data is of utmost importance for businesses and consumers in today’s digital world. Everything from documents, emails, and passwords to financial … See all articles in Insights

Training, endpoint management reduce remote working cybersecurity risks – Help Net Security
| | | | | | | | | | | | | | | | | | |

Training, endpoint management reduce remote working cybersecurity risks – Help Net Security

33% of companies are not providing any cybersecurity awareness training to users who work remotely, according to Hornetsecurity. The study also … See all articles in Insights

How to build trust with digital customers in a privacy-first age
| | | | | | | | | | | | | | | | | | |

How to build trust with digital customers in a privacy-first age

Advancements in data integration technology mean brands have an unprecedented ability to better connect with consumers. However, it’s no surprise that consumers are prioritizing brands that can engage in a timely, relevant and meaningful way — while respecting their privacy preferences. About 75% … See all articles in Insights