Wednesday, September 30, 2020
Home Data Security

Data Security

Employees Slack with cybersecurity Expectations

Employees Slack with cybersecurity Expectations

Cybersecurity strategy has topped the priority list for CIOs, since best practice steps are being ignored by employees despite knowing the risks and potential...
Top Ways Organizations Can Safeguard Healthcare Data

Top Ways Organizations Can Safeguard Healthcare Data

CISOs need to keep in mind a couple of things while protecting healthcare data. There has been a significant increase in the hacking of healthcare...
Cybersecurity Blind Spot –Recent Non-Human Identities Are Often Overlooked

Cybersecurity Blind Spot –Recent Non-Human Identities Are Often Overlooked

Data breaches are rapidly surging - access control and authentication safety demand to be tightened due to the associated risks. With the increasing data breaches...
Top Cyber security Factors to Consider as Organizations Reopen

Top Cyber security Factors to Consider as Organizations Reopen

IT leaders need to create new policies and processes to ensure a return to work is secure. CISOs and IT security leaders are preparing for...
C-Suite Witnessed Nearly 40% Drop in BEC Attacks in Q1

C-Suite Witnessed Nearly 40% Drop in BEC Attacks in Q1

Research says cybercriminals are targeting accounts payable departments. According to the latest report from Abnormal Security, there has been an increase on Business Email Compromise...
Whitelisting helps immensely in the security profile of organizations

Whitelisting helps immensely in the security profile of organizations

Whitelisting ensures that employees can take only actions that are approved by administrators. Organizations need to implement whitelisting for their devices as a part of...
Even the Good Enough IT Security Infrastructure Now Need to be the Best

Even the ‘Good Enough’ IT Security Infrastructure Now Need to be...

Organizations across all sizes have been forced to shift to remote workers hastily, their top priority being connectivity. As organizations return to work from the...
Most Coronavirus Tracing Apps Are Not Sufficiently Secured

Most Coronavirus Tracing Apps Are Not Sufficiently Secured

A majority of COVID-19 contact tracing mobile applications are not fully secured and exposing high risk, claims Guardsquare. Despite the rise of worldwide Coronavirus contact-tracing...
Cyber risk increases due to digital transformation

Cyber risk increases due to digital transformation

The misalignment between the C-suite and IT security department during digital transformation may significantly increase cyber risks Digital transformation is crucial but should be embraced...
COVID-19 Becoming a Catalyst for Evolving Cybersecurity Leadership

COVID-19 Becoming a Catalyst for Evolving Cybersecurity Leadership

The main challenge for cybersecurity executives is to integrate risk-mitigating technology into core processes and services perfectly — and to play the long- term...

Latest posts