Cybersecurity

Container Orchestration is Here. What Does it Mean for Security?

Container adoption is growing fast – often faster than security can keep up. Container orchestration can help close the gap, but the way many companies are using it actually creates new security risks. Those risks include using outdated tools, failing to revoke outdated access permissions, and overprovisioning users, says Rory McCune, cloud native security advocate […]

Container Orchestration is Here. What Does it Mean for Security? Read More »

Who’s Accessing Your Network Through Your Digital Supply Chain?

Situational awareness is a hot buzzword currently making its way through the cybersecurity community. But what exactly does situational awareness entail, and how is it related to future-proofing your businesses operations?  While there are many formal definitions for situational awareness, it basically boils down to this: companies need to understand the environment in which they

Who’s Accessing Your Network Through Your Digital Supply Chain? Read More »

Preventing An Inside Death: Best Practices for Mitigating Insider Threats

Here’s a quick reality check: the largest cybersecurity threats are often found on the inside.  More than 34% of businesses globally are affected by insider threats every year, with 2,500 companies in the United States alone encountering daily internal security breaches. Insider Threats Can’t be Blamed on Technology Even with these figures, insider attacks are

Preventing An Inside Death: Best Practices for Mitigating Insider Threats Read More »

The Security Metrics That Matter, and How to Build A Framework Around Them

Security metrics are essential in keeping track of the progress and effectiveness of your risk management programs. They’re also important in ensuring compliance with regulations, scaling up your cybersecurity efforts, and identifying gaps in your security framework. As in any other business area, constant monitoring is needed to achieve the best results. Here’s everything you

The Security Metrics That Matter, and How to Build A Framework Around Them Read More »

Exercising the Right Cyber Judgment When Making Technology Purchase Decisions

According to a report by PAM solutions provider Thycotic in 2020, 58% of IT security leaders say that their organizations are heeding the call for increased security budgets, and are planning to allocate more funds for the next 12 months. However, a significant portion of the requested investment did not materialize, as the threats that

Exercising the Right Cyber Judgment When Making Technology Purchase Decisions Read More »

Strategies For Extending the Enterprise Network to Remote Workers

The shift to remote work caused major disruptions during the height of the pandemic. As companies now regain momentum by way of hybrid work, can the same be said for their security plans and network architecture? Network congestion was already a recurring issue pre-pandemic, only to be exacerbated over the last 18 months as the

Strategies For Extending the Enterprise Network to Remote Workers Read More »

The Top Cybersecurity Threats to SaaS Companies

With digital transformation continuing to define the SaaS space, a number of SaaS companies have still yet to achieve foolproof security for their systems. Fifty-three percent of CISOs say that their security concerns have only grown since 2020, and with hackers stealing 75 records per second, these concerns are likely to persist. Dealing with Risks

The Top Cybersecurity Threats to SaaS Companies Read More »

Securing Digital Transformation: How to Minimize Risk in the Cloud

SaaS businesses have seen countless benefits since migrating to the cloud — lower costs, improved usability, streamlined processes, and more efficient operations. As roughly 73% of companies are projected to have transitioned SaaS-based solutions for their software by the end of 2021, more organizations are bound to realize the advantages of SaaS in the months

Securing Digital Transformation: How to Minimize Risk in the Cloud Read More »