Machine learning (ML) inputs and outputs are becoming more widely available to customers thanks to organizations in almost every sector integrating artificial intelligence (AI) technology into...
Supply chain attacks are on the rise, and many organizations seem unsure on how to respond to the threat, but I’m here to tell you that there...
Many legacy Privileged Access Management (PAM) solutions are still very manual regarding what they do and how they manage user access and permissions. They are geared...
Digital transformation is at the top of every organization’s agenda today. But while it is easy to make bold, forward-looking plans on paper, the reality of implementing...
Regulation of the Internet of Things (IoT) has always been a contentious subject. Those against claim it stymies growth of a nascent industry, while those advocating for it...
Cybercriminals typically rely on weak passwords to break into online accounts of unsuspecting victims, which often leads to severe consequences. But despite understanding the importance of strong passwords...
There are critical blind spots in most security solutions today that make it nearly impossible to detect and prevent lateral movement attacks. Understanding the fundamentals of...
In the power circles where policy and technology meet, there always seems to be someone with his or her “hair on fire” about some issue or...
Sophisticated attacks, remote work needs and rapidly changing technologies challenge organizations to manage IT security while containing costs and using overburdened staff. Security operations centers (SOCs)...
Organizations vary by size, industry, level of maturity, but one thing that they all have in common is needing to know how to quickly remediate security vulnerabilities....
Recent Comments