Infosys Launches Cyber Next Platform-Based Offerings, Powered by Microsoft Azure Sentinel (CDSA)

Infosys announced the launch of its Cyber Next platform-based offerings, powered by Microsoft Azure Sentinel. These offerings will help enterprises enhance security monitoring, man... More

GDPR Is More Than a Legislation, It’s a Cultural Shift (CPO)

The General Data Protection Regulation (GDPR) marked a stake in the ground when it comes to data privacy, redefining our understanding of the value of the data organizations hold o... More

Three Key Ways Continuous Delivery Improves Your Security Posture (DXC Technology Blog)

Continuous delivery yields a host of IT and operational benefits, including proven competitive advantages like faster deployment times, responses to customer feedback, and bug fixe... More

Security Pros Fear Insider Attacks Stem from Cloud Apps (Dark Reading)

More than half of security practitioners surveyed say insider attack detection has grown more difficult since migrating to cloud.... More

How to Keep IT Security Team Ahead of Alert Fatigue (CIO Dive)

Job burnout. It can happen to the best of us. One critical staffing issue is the rising problem of alert fatigue in IT security teams.... More

Cyber Threats Set to Double in 2020 (IT Pro Portal)

Many organizations are expecting the number of cybersecurity incidents to grow next year, but still aren't willing to purchase insurance and protect themselves, according to a new ... More

8 Tips for More Secure Mobile Computing (Dark Reading)

Mobile devices are a huge part of enterprise IT. Here's what to advise their users to do to keep their devices - and critical business data - best protected.... More

Improving Endpoint Security Needs to Be a Top Goal In 2020 (Forbes)

Attacking endpoints with AI, bots, and machine learning is gaining momentum with cybercriminals today with no signs of slowing down into 2020, making endpoint security a must-have ... More

Poor Cyber Resilience: An Organization’s Achilles’ Heel (CIO)

Digital advances are recreating global business through ongoing advances in artificial intelligence, the Internet of Things (IoT), data availability, blockchain, and other key area... More

What are the Key Risks of Cloud Computing? (NCC Group Blog)

The continued reliance on cloud computing shows no indication of slowing, with the global public cloud computing market set to reach $258 billion in 2019 and roughly a third of a t... More

Why the Future of Data Security in the Cloud is Programmable (Cloud Tech)

It’s the way software used to be purchased, and often still is. A CEO, or GM, or line-of-business owner calls into IT, and the security and compliance teams, to let them know tha... More

10 Reasons Your Organization Is Potentially at Risk of a Ransomware Attack (Security Intelligence)

Does ransomware respect the holiday season? With ransomware attacks attempted every 14 seconds, it’s not likely attackers take any days off. The threat of ransomware keeps growin... More

Tackling Disruption From New Digital Frontiers: Mitigating the Risk of Cyberattack (TechNative)

We are in the midst of unprecedented levels of digital disruption, which is proving hugely beneficial to industries all over the world. From enabling global expansion with more eas... More

Akamai Edge Platform Increases Security Protections for Content, Sites, Apps (MESA)

Akamai announced enhancements focused on maximizing security, quality, and reliability from the cloud to the digital touchpoint. With these new features, the Akamai Intelligent Edg... More

Four Steps to Mitigating Cloud Security Risks (Verdict)

The need for digital transformation has changed the mentality of decision makers who are now eager to benefit from the many advantages cloud services can bring to overall business ... More

Virginia a Hot Spot for Cybersecurity Jobs (Dark Reading)

Virginia currently ranks as one of the hottest states for cybersecurity professionals from a job opportunity and salary standpoint. New analysis placed the state in top spot for th... More

Cybersecurity Awareness Month: Checklist for a Cyberaware Life (SB)

Since October is now officially recognized as Cyber Security Awareness Month, for users and companies alike, let’s start figuring this out, beginning with a few simple rules to g... More

5 GDPR Pains That Won’t Go Away (CIO Dive)

General Data Protection Regulation caused headaches before enactment. A year later, the pain lingers. The main criticism of GDPR was that it laid down rules, but failed to determi... More

Why Managing Access is Essential for GDPR Compliance (Verdict)

The threat of potentially huge fines was one of the biggest talking points in the run up to the EU GDPR. Now, just over a year after the regulation entered into law, the Informatio... More

Security Needs Versus Worker Accessibility: The Balancing Act in Evolving Technology (TechNative)

The explosion of cloud and “as-a-service” technologies has made it easy for anyone within an organisation to both purchase and use preferred applications, often without interve... More