January 2022 Security Update: Ransomware Insights from Insiders
Expect the playing field—and the players—to continually change concerning ransomware.
Building Resilience in 2022 for Software Supply Chain Attacks
It's time to build resilience and trust into software supply chains and shore up defenses against threats.
4 Big Things to Know about Cybersecurity Today
Cybersecurity incidents have been rising steadily for several years, but there’s been an even more significant uptick in attacks since early 2020.
November Cybersecurity Update: A Shift from Reactive to Proactive
Law enforcement is making progress – and offering bounties – to stop ransomware gangs.
3 Ways the Pandemic Changed Cybersecurity Forever
Here's how the pandemic has changed key areas of cybersecurity, and what the future holds for each of them.
Data Science and Machine Learning’s Potential for Fraud Detection
Machine learning can be used to identify and address payment fraud risk long before it becomes a real problem.
October Security Update: It’s Cybersecurity Awareness Month
In the spirit of Cybersecurity Awareness Month, industry thought leaders share insights and news that can help you and your clients operate more safely and protect data.
Mobile Security: A Key Factor in Organizational Data Security
30% of data breaches are caused by a mobile device, so it is essential that all organizations develop a strong focus on mobile security.
The Fundamentals of Protecting Mobile Devices
Follow these cybersecurity best practices to physically and virtually secure mobile devices by applying multiple layers of protection.
Government Efforts Take Cyber Awareness to the Next Level, but an Ocean of Obstacles Lies Ahead
Security teams are being slowly drowned by attacks that weaken our nation’s largest businesses and critical infrastructure with no chance to catch their breath.
August Security Update: The (PrintNightmare) Continues
Train employees on current threats, make sure your security solutions are up to the task – and, maybe, disable your printer spooler.
Protecting Sensitive Education Data in the Cloud
Protecting cloud-stored data can be greatly enhanced if educational organizations take the following 5 steps to protect sensitive student and employee data.
4 Steps to Protect Cloud-Based Data from Ransomware
More than half of IT and security professionals rated their organization’s ability to protect data on cloud services as relatively low.
Under the Radar: Why are Security and Testing Still an Afterthought?
With breaches frequently making headlines, security is top of mind for every organization. So why, when it comes to software development, is security and testing often deprioritized?
Securing Your Employees’ Work Accounts: A Guide
To protect your employees and your company, it's vital that you keep up with the latest security standards, train your employees and secure your work accounts.