Security

News, trends and insights for cybersecurity in the digital age

Security banner

A 12-point framework for operational resilience

Businesses today must take a new approach to operational resilience so that they can be more adept at anticipating disruptive events and agile in responding to and recovering from them. In a world where risks and compliance requirements rapidly expand and evolve, it’s not a question of if there will be a disruption to your […]

5 key trends that will impact cyber security in 2021

Will this year be as tumultuous as 2020? Let’s hope not. But one thing won’t change: In 2021, as is the case every year, companies will continue to be challenged by new or evolving cyber security threats. We expect 5 security trends that emerged or accelerated last year to demand even more attention from organizations […]

Securing the rise of RPA

locks and keys

When it came to their transformation efforts, enterprises went all in last year, and they’re going to remain all in throughout 2020. A central aspect of any successful business transformation is automation and, increasingly, robotic process automation. RPA, or software bots, helps to automate everything from repetitive business process tasks to cloud infrastructure management functions. […]

Security tips to support remote work due to the coronavirus

working from home

In response to the coronavirus (COVID-19) and related social distancing rules and guidelines, an ever-increasing number of companies are closing their offices and implementing work from home policies. For some workers and companies, remote work is already routine. For others though, this is uncharted territory. Many workers who previously worked exclusively from an office suddenly […]

The rise of cyber security product sprawl

security sprawl

Twenty years ago, when enterprise information security was starting to hit its stride, nearly all enterprise security software products were bought as point solutions. They did one job – resist malware, scan for vulnerabilities, encrypt data, detect intrusions, etc. — very well. But over time the number of tools in the security practitioner’s toolbox grew […]

Where to deploy new security tools first for maximum effect

question mark cards

You have your eye on a new piece of security technology or service and you want to evaluate it before deciding whether to commit to the effort of a full deployment. Alternatively, you may already be committed to full-scale deployment but wondering where to start. So where should you deploy it first to test it […]

Phishing attacks on the rise

fish hook

It’s no surprise that phishing attacks remain among the most effective. By some estimates, phishing (specifically highly-targeted spear-phishing attacks) are how 91% of digital attacks are initiated. Even business and security leaders — those who clearly should know better — admit to being fooled. In our post, The high risk of data loss associated with employees, […]

2020 Tech Trend: Self-sovereign identity makes data shared in an ecosystem more valuable

As organizations focus on data-driven business models to remain competitive, they will increasingly seek to collaborate with partners and exchange data. Data shared in an ecosystem is more valuable than data locked in a silo because it leads to new innovations and customer experiences. This trend is playing out in many industries including transportation, logistics, […]

Staffers gone bad or bad decisions — which should you worry about more?

balance rocks

Insider threats have been in the news quite a bit recently, but insider threats don’t always present themselves as a staffer who has gone bad and is stealing and selling secrets to competitors or other nations. While that does happen, a good portion of the insider threat manifests in insiders who make bad decisions with how […]

Why a zero trust security model makes sense in healthcare

by Rikin Patel There has been a long-held assumption that data security threats originate from nefarious external forces seeking to steal an organization’s most sensitive data. Traditional security models were therefore designed with this view in mind and on the mistaken belief that everything within the internal network is trustworthy. But there is evidence that […]