Roundtable IoT Security – The Black Out will come
The Black Out will come – it’s not a question of if, but rather when. This is what all experts agreed upon in our 3rd Cyber Protection Magazine roundtable.
Read more...The Black Out will come – it’s not a question of if, but rather when. This is what all experts agreed upon in our 3rd Cyber Protection Magazine roundtable.
Read more...The year is almost over – reason enough for us to take a look at what’s ahead. This is the first in a series of predictions from cybersecurity experts of what we can expect in 2022. But beware: Predictions are difficult, especially about the future!
Read more...Computer Security Day comes around every 30th November as a reminder for enterprises to make security a strategic priority. With this in mind, we spoke to nine technology industry experts about the importance of taking cybersecurity seriously and the best methods in defending your organisation against cyber attacks.
Read more...Black Friday has exploded worldwide over the past couple of years. With all these shoppers online, Black Friday is like an ‘Early Christmas’ for cyber criminals. We spoke to industry experts about the steps organisations can take to enjoy a successful and trouble-free Black Friday.
Read more...Establishing consistency in security protocols is a challenge for any organization developing and implementing APIs. Judicious use of automation can mitigate development delays and facilitate development, as panel discussion showed.
Read more...SASE, CASB, Zero Trust, SSE – confused yet by all the abbrevations and acryonyms? Cybersecurity ist a highly dynamic field, and even the analysts find it hard to keep up.
We asked Mike Schuricht, VP Products at Forcepoint, to shed some light on Security Service Edge and explains its relationship to SASE and some other cybersecurity abbreviations in this Video Byte.
For organisations, employees neglecting to set strong passwords or having poor password habits can increase vulnerability to its cybersecurity strategy. sing strong passwords for account logins is one of the basic steps, yet time and time again, employees fail to comply with security policies at work.
Read more...A 17-year-old FBI report claimed that 80 per cent of data breaches originate internally. A recent report on Statista, demonstrates that the problem is much more nuanced.
Read more...One of the biggest barriers to cybersecurity could ironically be your own employees. Here are some strategies that you can try to involve your employees in your cybersecurity strategy.
Read more...The API economy presents a challenge all of its own. Making API security part of your overall cybersecurity strategy can combat that challenge, says a panel of experts. Read the summary in our latest article.
Read more...