Smart IAM: The Key to Seamless Sign-Ons

In a connected, but still remote, world, employees are logging in from countless devices and locations. Behaviors that were once uncommon – like accessing the corporate network on multiple or personal devices – are commonplace today. Driven by the exp… Continue reading Smart IAM: The Key to Seamless Sign-Ons

Securing Dev Environments is Security Leaders’ Top Concern

Today, CI/CD pipelines form the backbone of modern DevOps operations. Over the past few years, the software development industry has pivoted to a continuous integration and continuous delivery (CI/CD) process that offers application developers a faste… Continue reading Securing Dev Environments is Security Leaders’ Top Concern

Understanding and Preventing S3 Leaks

Amazon Simple Storage Service, or S3, is a popular service that many developers today rely on to quickly build applications. Over time, S3 has become a popular target for attackers, resulting in a large number of data leaks. Most of them, such as the … Continue reading Understanding and Preventing S3 Leaks

Breach Clarity Data Breach Report: Week of March 29

Each week Breach Clarity, recently acquired by Sontiq, compiles a list of what it considers to be notable data breaches—those that are worth highlighting because of the increased intensity of the risk to personal information. The Breach Clarity score … Continue reading Breach Clarity Data Breach Report: Week of March 29

How to Secure the Home Branch Office

Amid the pandemic, most workforces have shifted to remote work and home offices; essentially, transforming their living rooms into corporate branch offices. From a convenience and health perspective, this has worked well, for the most part. However, t… Continue reading How to Secure the Home Branch Office

How to Get the Best Results From ZTNA

The pandemic greatly expanded the work-from-home population. Due to the pandemic, 86% of IT leaders say that at least a quarter of their staff members are connecting to corporate networks through personal and shared devices. But even before the pandem… Continue reading How to Get the Best Results From ZTNA

3 Foundations of a Data Security Strategy

Data is one of the most important assets your organization has, and protecting it is no longer optional. Cyberattacks can come in multiple forms, including outsider attacks such as phishing or malware, as well as insider threats via social engineering… Continue reading 3 Foundations of a Data Security Strategy

Setting up a SOC in the Midst of a Pandemic

Setting up a new business is never easy. Ask any entrepreneur and they will tell you about the sleepless nights, long hours and endless anxieties along the way. But, when starting a business in the midst of a global pandemic, each of these issues is m… Continue reading Setting up a SOC in the Midst of a Pandemic

Breach Clarity Data Breach Report: Week of March 23

Each week Breach Clarity, recently acquired by Sontiq, compiles a list of what it considers to be notable data breaches—those that are worth highlighting because of the increased intensity of the risk to personal information. The Breach Clarity score … Continue reading Breach Clarity Data Breach Report: Week of March 23

Preventing Cyberattacks on Water Infrastructure

To get a preview of the next possible mass casualty terrorist attack, look no further than the town – and critical infrastructure – of Oldsmar, Florida. In what was surely a Sum of All Fears moment for government officials, a cyber intrude… Continue reading Preventing Cyberattacks on Water Infrastructure