Reducing the Risk of Credential Leakage

Long-term cloud credentials are often scattered throughout source code, on laptops or desktops, on servers, in cloud resources and in other locations. It’s easy to copy them across machines, creating credential sprawl that increases your leakage risk…. Continue reading Reducing the Risk of Credential Leakage

Can Managed Security Keep Businesses Safer?

In the last two decades, the cybersecurity industry has grown from a niche sector into a dominant force in the business world. Today, Gartner predicts that cybersecurity spending will reach $150 billion this year, almost double what was predicted in 2… Continue reading Can Managed Security Keep Businesses Safer?

A New Approach to Tackling Cybersecurity Threats

Last month, the FBI warned that ransomware attacks, like the one on the Colonial Pipeline, are a growing problem. From attacks on the Miami-Dade School District to Apple’s $50 million ransomware mess, the agency is investigating growing instances of c… Continue reading A New Approach to Tackling Cybersecurity Threats

Understanding Global IoT Security Regulations

The IoT is maturing rapidly, and surveys show that global IoT spending will achieve a combined annual growth rate (CAGR) of 11.3% over the 2020-2024 forecast period. It offers promising benefits that are rapidly transforming a variety of industries, i… Continue reading Understanding Global IoT Security Regulations

Data Clean Rooms for Innovation and Collaboration

Data, being a key enabler for innovation, growth, development and revenue, is the currency of the 21st century and an organization’s most valuable asset. Unlike a tangible asset, the value an organization can seek from data is endless; essentially, th… Continue reading Data Clean Rooms for Innovation and Collaboration

Critical Infrastructure is Missing Something Critical

The Colonial Pipeline attack was yet another reminder that critical infrastructure is in desperate need of stronger security. The attack is one of the most recent victims of cyberattacks on critical infrastructure; the phenomenon is not new, nor is it… Continue reading Critical Infrastructure is Missing Something Critical

How Air Gapping Can Protect IP

In today’s hyperautomated world, organizations connect various environments, applications and databases to one another, creating complex infrastructures. Security professionals discuss the difficulties inherent in securing cloud environments, and the … Continue reading How Air Gapping Can Protect IP

Top 8 Ways Attackers Can Own Active Directory

Active Directory (AD) is one of the most valuable targets for cyberattackers because it handles authentication and authorization across all enterprise resources and touches virtually everything on the network. AD is complicated to secure, and today, r… Continue reading Top 8 Ways Attackers Can Own Active Directory

Data Classification Best Practices

Data classification tools not only help organizations to protect their data, they also help users understand how to treat different types of data with different levels of sensitivity. Automation plays a central role in data governance and helps to mai… Continue reading Data Classification Best Practices

5 Steps to Effective CUI Classification

Prior to the U.S. government’s National Archives and Records Administration’s (NARA) implementation of the Controlled Unclassified Information (CUI) protection framework, government agencies employed ad hoc agency-specific policies, procedures and mar… Continue reading 5 Steps to Effective CUI Classification