Guest Author

Common Roadblocks to Completing a SOC 2 Audit

Common Roadblocks to Completing a SOC 2 Audit

Author: Joseph Kirkpatrick is the President of Kirkpatrick Price A SOC 2 report helps enterprises to demonstrate they take security and privacy seriously. Enterprise leaders...
Why We Need to Prioritize Cyber Resilience

Why We Need to Prioritize Cyber Resilience

Author: Jon Fielding, Managing Director EMEA, Apricorn Through 2020 and into 2021, cyber threats have increasingly targeted the end-user working from home, with attackers exploiting unprepared...
ROB PRICE

The Return of Shadow IT – and the Need to Remain...

By Rob Price, Senior Specialist Solutions Consultant and Global Lead for Risk & Compliance, Snow Software Over the years, shadow IT has been a bit...
NIGEl

Can Businesses Trust Zero Trust?

Author: Nigel Thorpe, Technical Director at SecureAge Technology The traditional security model assumes that everything inside the corporate boundary is safe and trusted, and...
PAUL COLWELL-01

Social engineering dangers for enterprises to be aware of

By Paul Colwell, CTO, CyberGuard Technologies Cybercriminals are using email trickery and falsehoods to gain access to business networks and steal or compromise corporate data Many corporate...
SHITESH

Top tips for remaining secure and compliant while working from home

Shitesh Sachan, White Hat Hacker and CEO of Detox Technologies. The demand for remote working due to the COVID-19 pandemic has invariably placed renewed pressure...
fredrik

Maintaining a Secure Data Culture During and After COVID-19

Fredrik Forslund, VP of Cloud and Data Center Erasure Solutions, Blancco Like many other organizations, the World Health Organisation (WHO) has reported a fivefold increase in cyber-attacks faced...
Why Enterprises Should Rush to Adopt Multi-factor Authentication

Why Enterprises Should Rush to Adopt Multi-factor Authentication

Phishing attacks, social engineering, database breaches, cyber-attacks - all terms that have found their way into our daily lives. If the incessant news of...
SAMANTHA

Methodologies for Efficient Security Simulations that Work

With cyber threats on the rise in the age of a distributed workforce, organizations are looking for ways to identify vulnerabilities and gaps in...
BOB BAXLEY-01

Safeguarding Facilities from Radio Frequency Cyber attacks

Bob Baxley, CTO at Bastille Networks When secure facilities say “no devices allowed,” that’s not necessarily the case. Exceptions are granted for personal medical devices, health monitors,...

Latest posts