SASE & Zero Trust: The Dream Team
Forcepoint’s Nico Fischbach, global CTO and VPE of SASE, and Chase Cunningham, chief strategy officer at Ericom Software, on using SASE to make Zero Trust real.
Continue reading SASE & Zero Trust: The Dream Team
Collaborate Disseminate
Forcepoint’s Nico Fischbach, global CTO and VPE of SASE, and Chase Cunningham, chief strategy officer at Ericom Software, on using SASE to make Zero Trust real.
Continue reading SASE & Zero Trust: The Dream Team
Security teams should brace for an unsettling and unprecedented year, as we’re on pace to see 40 billion records compromised by the end of 2021. Imperva’s Terry Ray explains what security teams need to do to bolster their defenses. Continue reading Billions of Compromised Records and Counting: Why the Application Layer is Still the Front Door for Data Breaches
In this Threatpost podcast, Fortinet’s top researcher sketches out the ransom landscape, with takeaways from the DarkSide attack on Colonial Pipeline. Continue reading Podcast: The State of Ransomware
In this Threatpost podcast, Forcepoint’s SASE and Zero Trust director describes how the pandemic jump-started SASE adoption. Continue reading Effective Adoption of SASE in 2021
In this Threatpost podcast Fortinet’s top researcher outlines what a cybercriminal supply chain is and how much the illicit market is worth. Continue reading Spotlight on the Cybercriminal Supply Chains
Insider threats are redefined in 2021, the work-from-home trend will continue define the threat landscape and mobile endpoints become the attack vector of choice, according 2021 forecasts. Continue reading 2021 Cybersecurity Trends: Bigger Budgets, Endpoint Emphasis and Cloud
A look back at what was hot with readers — offering a snapshot of the security stories that were most top-of-mind for security professionals and consumers throughout the year. Continue reading The 5 Most-Wanted Threatpost Stories of 2020
What are the riskiest links in the virtual healthcare chain? Threatpost readers weigh in as part of an exclusive telemed poll. Continue reading Telemed Poll Uncovers Biggest Risks and Best Practices
“Insider threat” or “human error” shows up a lot as the major cause of data breaches across all types of reports out there. But often it’s not defined, or it’s not clearly defined, so people conjure up their own definition. Continue reading Insider Threats: What Are They, Really?
The massive shift to remote work has turbocharged the shadow IT problem. Continue reading Code42 Incydr Series: Bringing Shadow IT into the light with Code42 Incydr