Laden...
The day's top cybersecurity news and in-depth coverage
August 27, 2020
A new report and tabletop exercise show how the upcoming US elections could be disrupted at the local government level without hacking the election itself. Read more â¶
As businesses prioritize agility and continuity, data and users are more mobile than ever. Security teams need to understand and manage the risks of the WFH world, collaboration culture, and the post-COVID business climateâwithout slowing down users or impeding the business.
More than ever, a strong organizational identity is essential for building trust with users.
Attackers look for unsecured printers as a point of access. Find them before they do. Here's how.
In todayâs digital enterprise, the most valuable assets are its people and the data they interact with. But the challenges of protecting both users and data are complex and continue to emerge and morph: the expanding attack surface, lack of visibility, disjointed security policies, disparate compliance regulations, make this a challenge for all businesses every day.
Viable options are now available to supplement or eliminate (almost) the need for password authentication. Here are reasons why passwordless might work for you.
New research from ESG and ISSA illustrates a lack of advancement in bridging the cybersecurity skill shortage gap.
Many organizations lack the internal expertise to address threat detection and response effectively; MDR can fill the gap. Hereâs what to look for when you shop for MDR services.
© 2024