HomeCybersecurity

Cybersecurity

Security and Backup Alignment Critical to Ransomware Recovery

Ransomware continues to plague organizations all over the world. The most common entry points of ransomware into enterprise IT environments are phishing emails, malicious...

Cybersecurity and Decentralized Finance: 4 Key Points

Criminals are now adopting cryptocurrency and non-fungible tokens (NFTs) to cleanse their illicit funds as an additional method of money laundering. For banks and...

Sponsored: Helping Organizations Automate Cybersecurity Across Their Digital Terrains

The digital world is changing, and you need cybersecurity solutions that change with it. Forescout Continuum can help.

Visa’s Michael Jabbara on Cybersecurity and Digital Payments

I spoke with Michael Jabbara, VP and Global Head of Fraud Services at Visa, about the cybersecurity technology used to ensure the safe transfer...

5 Cybersecurity Threats That Aren’t Going Away

Last year saw the highest average cost of a data breach in 17 years, with the cost rising from $3.86 million to $4.24 million...

Cloud Customer Beware: 3 Challenges with Cloud Migrations

For all of cloud computing's potential, business leaders need to keep their feet firmly on the ground and recognize the sheer complexity of cloud...

Splunk vs. IBM QRadar: Software Comparison

Clearly, both of these solutions, IBM QRadar and Splunk, address a growing market demand for cybersecurity. There is no shortage of challenges facing cybersecurity...

Query.AI CEO Dhiraj Sharan on the Limits of AI in Cybersecurity

I spoke with Dhiraj Sharan, Founder and CEO of Query.AI, about why – despite the hype – artificial intelligence should be viewed as an...

AWS’s Nandini Ramani on Monitoring and Observability

I spoke with Nandini Ramani, VP, Monitoring and Observability at AWS, about Amazon Cloudwatch, and current developments in observability, a technology that is gaining...

Machine Identities Are Dangerously Vulnerable

Identity security is in the spotlight these days, and it’s easy to see why. The most recent Verizon Data Breach Investigations Report found that...