Trends

How to Improve SD-WAN Security

As the modern workforce becomes increasingly mobile and enterprises branch out and grow, software-defined wide area networks (SD-WAN) have become a popular choice in the evolution of networking. ...

Security in Milliseconds: Visa Invests in Payment Security as E-Commerce Surges

The COVID-19 pandemic has driven a massive increase in e-commerce spending, doubling to an expected $1 trillion this year, according to Adobe. But that spending surge has brought with it a co...

Software Supply Chain: A Risky Time for Dependencies

The software supply chain is a critical element in the lifecycle of applications and websites. The interdependencies and components common in modern software development can increase the attack surf...

Top VC Firms in Cybersecurity for 2022

Whether it's a startup or established organization seeking funding, the right venture capital (VC) firm can make the difference in financial and operational success. Navigating the funding landsca...

Why You Need to Tune EDR to Secure Your Environment

Endpoint detection and response (EDR) solutions typically deploy in a standard configuration meant to deliver the least number of false positive alerts in a generic environment. This allows EDR to ...

MFA Advantages and Weaknesses

Not everyone adopts multi-factor authentication (MFA) to secure their accounts. Many stick with simple username and password combinations despite the weaknesses of this authentication method. Yet i...

A Few Clicks from Data Disaster: The State of Enterprise Security

Once an organization has been breached, the overwhelming majority of critical assets are just a few attack techniques away from being compromised, according to a new study. The report by breach and...

Biden Approves Cybersecurity Reporting, Issues Rare Warning

President Joe Biden has faced a number of crises since taking office in January 2021, but his Administration has nonetheless managed to be at the forefront of the U.S. response to cyber attacks by cri...

McAfee Cloud Launches as Skyhigh Security

The final piece of the complicated Mandiant-FireEye split and subsequent FireEye-McAfee merger fell into place today, as McAfee's cloud security business was officially spun off under the new name of ...

Written IT Security Policies: Why You Need Them & How to Create Them

Many security professionals think that if they have done the hard work of securing their organization, that should be enough. There is, however, a next step: Documenting policies. Even though draft...

Latest articles