Cyber Security
Ransomware Attacks Show Little Sign of Slowing in 2021 (Dark Reading)
Attackers have little motivation to stop when businesses are paying increasingly larger ransoms, say security experts who foresee a rise in attacks.... More
Cybersecurity Strategy: Building Trust on Shifting Sands (Security Intelligence)
Transforming the enterprise for digital business requires a change in technology, process and culture. Along with this comes necessary changes on a cybersecurity strategy. Like wal... More
What CIOs Need to Know About 5G Cybersecurity (Tech HQ)
As the transition towards 5G looms, get prepared for a host of new cyberthreats.... More
The Pressures the Online Gaming Community Faces When it Comes to Cybersecurity (SM)
Online games and specifically the Massive Multi-Player games, experience multiple attacks from hackers, platform competition that try to block players’ access to the gaming platf... More
Modernizing Your Security Operations Center for the Cloud (Security Intelligence)
Several factors are converging to exert pressure on how security operations centers (SOCs) traditionally function. Evolving information technology (IT) infrastructure, such as clou... More
Work From Home: Rethinking Security for a Boundaryless World (Avanade Insights)
The reality is that even before the coronavirus pandemic sent millions of employees to the home office, our personal digital ecosystems were already fraught with risk and complexit... More
State of Cybersecurity 2020: Changes, Challenges for WFH Culture (Richie May Blog)
As we have continued to stress in our most recent articles, many aspects of how businesses operate have changed over the past year, especially as a result of COVID-19. One thing th... More
Cybersecurity Awareness: A Key Lever in Cyber Defense (Forbes)
Organizations are increasingly adopting intelligence-driven cyber defense strategies. The costs and complexities involved in waging cyberattacks are significantly lower when compar... More
IBM Advances Cloud Pak for Security to Manage Threats Across Tools, Teams, Clouds
IBM announced new and upcoming capabilities for Cloud Pak for Security, including a first of its kind data security solution that allows companies to detect, respond to and protect... More
Can We Take Business Lessons From Cybercriminals? (Tech HQ)
While we defend our businesses like islands, information sharing is giving cyber attackers the upper hand. ... More
Cybersecurity and Your Passwords (Forbes)
What's something that stands between you and a cybercriminal that's in your full control? Your password. The world of password security is a tricky one because many of the best pra... More
Cybercrime is Now a Global Worry (IT Pro Portal)
Pretty much anyone that uses the internet worries about cybercrime.... More
How Cybersecurity Threat Intelligence Teams Spot Attacks Before They Start (Security Intelligence)
A thorough cybersecurity threat intelligence team can turn a threat into a tool for future protection. Their job is to conduct background research on threat groups’ motivations a... More
3 Ways to Tighten Security and Get Ready for the New Normal (Avanade Insights)
Imagine if cybercriminals had a shred of decency. If they did, they wouldn’t take advantage of a global pandemic that has so far cost more than 400,000 lives. Unfortunately, that... More
Data Governance in the 21st-Century Organization (MIT Sloan)
Good governance requires balance and adjustment. When done well, it can fuel digital innovation without compromising security.... More
Cybersecurity Today: The Intersection of Technology and Behavior (Security Intelligence)
Wireless LAN, Bluetooth connectivity or mobile data transfer (which will explode with the wider deployment of 5G) are ubiquitous today. So what does this mean to the everyday perso... More
Why Do Hackers Hack? Perhaps Not for the Reasons You Think (Tech HQ)
When we think about the cyberattacks taking place minute by minute, day by day, we may assume financial motivations are key — but that's not always the case.... More
Cybersecurity Awareness Month is Here (WeLiveSecurity)
This year’s overarching theme of CSAM in the US is “Do Your Part. #BeCyberSmart.” The key message “If you connect it, protect it” focuses on the increasing inter-connecte... More
10 Security Pitfalls to Avoid in 2020 (Avanade Insights)
Cybersecurity is taking on a whole new level of urgency. With a huge percentage of employees shifting to remote working, managing this new world of work securely is proving extreme... More
Does the Future of Cybersecurity Lie in Tools or Talent? (Tech HQ)
Many believe that outsourcing cybersecurity or procuring the right technology can help overcome cybersecurity skill shortages, stress and burnout. The key remains to equip your IT ... More