Friday, February 26, 2021
Home Featured Articles

Featured Articles

Featured posts

Strategies to Overcome Barriers and Gain Executive Buy-in for Cybersecurity

Strategies to Overcome Barriers and Gain Executive Buy-in for Cybersecurity

Employing and managing executive buy-in and support for the cybersecurity program is never one-and-done. It’s a continuous process that’s ever-evolving, much like today’s advanced...
Cloud-Native Apps Call for Increased Supply Chain Security

Cloud-Native Apps Call for Increased Supply Chain Security

Cloud-native deployments are often short, interchangeable, and simpler to guard, but their software supply chains need closer attention. The foremost reason that businesses leverage open...
Cybersecurity Spending Around Critical Infrastructure to Touch _105.99 Billion This Year

Cybersecurity Spending Around Critical Infrastructure to Touch $105.99 Billion This Year

The cybersecurity spending for critical infrastructure will surge by $9 billion this year, with an average YOY growth of about 5 -10%, reveals ABI...
Key Strategies to Securing Distributed Cloud in Enterprise Environments

Key Strategies to Securing Distributed Cloud in Enterprise Environments

Distributed clouds will likely continue to grow in adoption due to the large volume of applications and IT assets in enterprise environments. However, complex...
Effectively Integrating Threat Intelligence within Existing Security Operations (1)

Addressing the Cloud Permissions Gap with CIEM

There has been a dramatic increase in the breaches in the cloud space, and the majority of those breaches were a result of identities...
Thycotic Integrates with Slack for Seamless Privileged Credential Access and Daily Workflow

Effectively Integrating Threat Intelligence within Existing Security Operations

Collecting the required threat intel in today's environment is getting more complex with the surge of evolving cyber-attacks and complex data. Therefore, CISOs need...
Managing Identity in a Hybrid and Multi-Cloud World

Managing Identity in a Hybrid and Multi-Cloud World

Controlling who has access to an organization's resources and data assets remains a challenge in 2021. With a vast majority of network compromises involving the...
How has Cybercrime gone Mainstream in 2021

How has Cybercrime gone Mainstream in 2021?

Organized cybercrime is global in scale and will emerge as the second-largest threat in the coming decade. According to ITU Publications, over 50% of...
The Price of Synthetic Fraud Attack to Touch New Highs in the Post- Pandemic Era

The Price of Synthetic Fraud Attack to Touch New Highs in...

The cost of synthetic fraud will rebound in the post-pandemic era, claims a recent Aite Group study. A recent research study by TransUnion finds instances...
Facial Recognition An Ethical Menace

Facial Recognition: An Ethical Menace

While facial recognition existed before the development of AI, consent began to be ignored as datasets got heavier Machine Learning and AI may have leveraged...

Latest posts