The CSO Conference & Awards: A Brief History
Blockchain Technology: From Hype to The Future
Tools to Meet Tomorrow’s Mobile Cybersecurity Threats for Government
Account Takeover Fraud: Navigating the Treacherous Digital Waters
The Importance of Jailbreaks for iOS Security Work
{Latest Posts}
Securing Endpoints: The Gateways to Your Enterprise
Endpoints across an IT network lay the foundation of every modern-day enterprise. These endpoints, comprising of laptops, desktops, and mobile devices that connect to the business’s network are seen by malicious actors as potential gateways
The Principle of Least Privilege: The Whats, the Whys, and the Hows
According to a recent infographic, in 2020 more than 70% of cybersecurity breaches happened due to the misuse of privileges. This emphasizes the need for the enterprise-wide elimination of unnecessary privileges, which is exactly what
Implementing Application Control and Eliminating Productivity Dips
Application control, an integral step in achieving comprehensive endpoint security, often comes with implementation difficulties. Many organizations prioritize productivity issues over security issues, and tend to postpone taking the required measures to ensure their infrastructure
Cybersecurity Acronyms – A Practical Glossary
Whether you are a cybersecurity professional, an end-user, just starting in cybersecurity or interested in the field, this cybersecurity acronym practical glossary is for everyone. Cybersecurity acronyms can be confusing, especially with some acronyms having
Avoiding Rough Patches Using Patch Management
Patch management is an essential part of sustaining IT services in this era of malware and growing cyber threats. Letting your guard down in network security makes your organization an easy target for cybercriminals. The
How to Become a SOC Analyst
A Security Operations Center, or SOC, is one of the most important departments for any modern business. It is here that the organization’s cybersecurity team does their job, monitoring and analyzing their security networks in
Data Protection Starts with Endpoint Protection
“Privacy is one of the biggest problems in the new electronic age” – Andy Grove. Data privacy has become a pressing need. Twenty-seven data breaches have occurred in the past four months of this year,
Even Cyber Pros Fall Victim to Cybercrime and Bad Habits
Back in January of 2021, you may have seen this eye-catching headline: “Hackers are targeting security researchers”. As it turns out, threat actors in North Korea were luring pen testers and other vulnerability professionals into