Improved threat-detection capabilities have led to the unintended consequence of "alert overload." Whether due to detecting an abundance of real threats or generating an...
Recently The Wall Street Journal published an article titled “Cyber Chiefs Watch Their People for Burnout as Pandemic Rolls On, which posited that IT security teams are...
By Otavio Freire
During the pandemic, employees have been targeted by bad actors like never before. To properly protect their employees, companies need to implement...
Some special days on the calendar are whimsical, some are over-commercialized. International Data Privacy Day, recognized each year on Jan. 28, is neither. It...
In the daily news, we see disasters all too frequently: hurricanes, fires, floods, earthquakes, transportation accidents … it’s a sad and lengthy list. Data...
When the President of the United States elevates his science advisor to a cabinet-level position, you know that he’s paying attention to science and...
Recent cloud services compromises have demonstrated the importance of controlling identities for access to cloud-delivered services. Afterall, usurping identities has become one of the...
As the growing COVID-19 pandemic has pushed more and more companies into cloud services and remote collaboration applications they hadn't planned to encounter quite...
Today: Armis Security (enterprise-class device security software)Company description: Armis is an agentless, enterprise-class device security platform, designed to protect organizations from cyberthreats created by the...
Customer experience (CX) became the top brand differentiator in 2018, outpacing price, product quality and everything else. Businesses that offer a superior and differentiated...
The trickle-down effect of enterprise IT is as old as business technology. Vendors have long aimed new innovations at enterprises whose deep pockets and...