Security

News, trends and insights for cybersecurity in the digital age

Security tips to support remote work due to the coronavirus

working from home

In response to the coronavirus (COVID-19) and related social distancing rules and guidelines, an ever-increasing number of companies are closing their offices and implementing work from home policies. For some workers and companies, remote work is already routine. For others though, this is uncharted territory. Many workers who previously worked exclusively from an office suddenly […]

The rise of cyber security product sprawl

security sprawl

Twenty years ago, when enterprise information security was starting to hit its stride, nearly all enterprise security software products were bought as point solutions. They did one job – resist malware, scan for vulnerabilities, encrypt data, detect intrusions, etc. — very well. But over time the number of tools in the security practitioner’s toolbox grew […]

Where to deploy new security tools first for maximum effect

question mark post its

You have your eye on a new piece of security technology or service and you want to evaluate it before deciding whether to commit to the effort of a full deployment. Alternatively, you may already be committed to full-scale deployment but wondering where to start. So where should you deploy it first to test it […]

Phishing attacks on the rise

phishing hook in water

It’s no surprise that phishing attacks remain among the most effective. By some estimates, phishing (specifically highly-targeted spear-phishing attacks) are how 91% of digital attacks are initiated. Even business and security leaders — those who clearly should know better — admit to being fooled. In our post, The high risk of data loss associated with employees, […]

2020 Tech Trend: Self-sovereign identity makes data shared in an ecosystem more valuable

As organizations focus on data-driven business models to remain competitive, they will increasingly seek to collaborate with partners and exchange data. Data shared in an ecosystem is more valuable than data locked in a silo because it leads to new innovations and customer experiences. This trend is playing out in many industries including transportation, logistics, […]

Staffers gone bad or bad decisions — which should you worry about more?

rock scale overlooking water

Insider threats have been in the news quite a bit recently, but insider threats don’t always present themselves as a staffer who has gone bad and is stealing and selling secrets to competitors or other nations. While that does happen, a good portion of the insider threat manifests in insiders who make bad decisions with how […]

Why a zero trust security model makes sense in healthcare

by Rikin Patel There has been a long-held assumption that data security threats originate from nefarious external forces seeking to steal an organization’s most sensitive data. Traditional security models were therefore designed with this view in mind and on the mistaken belief that everything within the internal network is trustworthy. But there is evidence that […]

The high risk of data loss associated with employees

company data on employee laptop

The security threat from insiders is growing. Consider the most recent Verizon Data Breach Investigation Report (DBIR), which found that 20% of cybersecurity incidents and 15% of data breaches investigated within the Verizon DBIR originated from people within the organization. According to Verizon’s DBIR analysis, the top motivators behind insider attacks were financial gain (48%) […]

Three key ways continuous delivery improves your security posture

traffic at night

Continuous delivery yields a host of IT and operational benefits, including proven competitive advantages like faster deployment times, responses to customer feedback, and bug fixes.  But one aspect that tends not to make it on the marquee list of benefits — and should probably be headlining it — is security. It’s really quite simple — […]

How mesh networking ensures uninterrupted data exchange between connected devices

One of the major challenges with connected devices is having a reliable network. Cell phone and standard Wi-Fi networks do not guarantee communication everywhere. Even dense urban  areas have numerous “dead” cellular zones in building basements, elevators, tunnels and underpasses. Remote areas like crop fields, mines, oceans and space also pose problems. With this in […]