Wednesday, December 2, 2020
Home Cybersecurity

Cybersecurity

CHRIS GAEBLER

Tackling the Legacy Firewall challenges

    “The first step is to understand that firewalls have significant limitations in the modern world (cramping agility) and have anyway been made almost redundant...
Employees Slack with cybersecurity Expectations

Employees Slack with cybersecurity Expectations

Cybersecurity strategy has topped the priority list for CIOs, since best practice steps are being ignored by employees despite knowing the risks and potential...
Top Ways Organizations Can Safeguard Healthcare Data

Top Ways Organizations Can Safeguard Healthcare Data

CISOs need to keep in mind a couple of things while protecting healthcare data. There has been a significant increase in the hacking of healthcare...
Cyber Security Skill Gap - Fixed with Diversity and Creativity

Cyber Security Skill Gap – Fixed with Diversity and Creativity

The cybersecurity skills shortage continues to turn into reality, getting worse slowly – creativity and diversity can fixing this. The role of digital innovation initiatives...
C-Suite Witnessed Nearly 40% Drop in BEC Attacks in Q1

C-Suite Witnessed Nearly 40% Drop in BEC Attacks in Q1

Research says cybercriminals are targeting accounts payable departments. According to the latest report from Abnormal Security, there has been an increase on Business Email Compromise...
Even the Good Enough IT Security Infrastructure Now Need to be the Best

Even the ‘Good Enough’ IT Security Infrastructure Now Need to be...

Organizations across all sizes have been forced to shift to remote workers hastily, their top priority being connectivity. As organizations return to work from the...
COVID-19 Becoming a Catalyst for Evolving Cybersecurity Leadership

COVID-19 Becoming a Catalyst for Evolving Cybersecurity Leadership

The main challenge for cybersecurity executives is to integrate risk-mitigating technology into core processes and services perfectly — and to play the long- term...
Top IoT Security Challenges amid COVID-19

Top IoT Security Challenges amid COVID-19

Although IoT deployments have been omnipresent in recent times, very little has been done in terms of the security of these devices. The worldwide IoT...
Access and Identity Management - Is the Sense of Security Misleading

Access and Identity Management – Is the Sense of Security ...

The evolution of a stricter regulatory environment, a greater need for internal governance combined with the rise in identity theft is pushing companies to defend themselves...
AI, Machine Learning, Cyber Security, Norton Security, CEO, CTO, CISO, IT, AI, Machine Learning, Cyber Security, Norton Security,

AI and Cyber Security: A Futuristic Collaboration in the Making

Amidst the rising online cyber-attacks, many enterprises are experimenting with AI-based cybersecurity programs to tackle the threats. AI and Machine Learning technology promise to...

Latest posts