Data Security

by

The Hidden Data Security and Compliance Risks of Organizational Silos

Are organizational silos opening up hidden risks for compliance and data security? The post The Hidden Data Security and Compliance Risks of Organizational...

Read More →

Data Security

by

Consolidation and Regulation in Identity and Access Management

Find out how consolidation strategies and regulations affect the evolution of IAM. The post Consolidation and Regulation in Identity and Access Management...

Read More →

CybersecurityData Security

by

Rubrik is the Third Company to Confirm Data Breach Through GoAnywhere Bug

Community Health Systems (CHS), Hatch Bank, and now Rubrik are among the 130 victim organizations. The post Rubrik is the Third Company to Confirm Data Breach...

Read More →

CybersecurityData Security

by

Security in an Increasingly Distributed-Workforce World

Check out tips for monitoring and mitigating security threats to limit their impacts on businesses. The post Security in an Increasingly Distributed-Workforce...

Read More →

CybersecurityData Security

by

U.S. House Health Insurer Suffers Data Breach: Members and Staff Affected

A threat actor going by the name IntelBroker has claimed to have said data and is selling it on a cybercriminal forum. Learn more. The post U.S. House Health...

Read More →

CybersecurityData Security

by

Acer Confirms Breach as Hacker Begins To Sell Stolen IP for Monero

The world’s sixth-largest PC maker suffered the theft of over 2,869 and 655 directories files totaling approximately 160 gigabytes. Learn more. The post Acer...

Read More →

APIData Security

by

How To Monitor & Manage API Logging Challenges

Having your cake and eating it, too – solving the API logging challenges. The post How To Monitor & Manage API Logging Challenges appeared first on...

Read More →

CybersecurityData Security

by

News Corp Hackers Hid Inside the Network for Two Years

The hackers attained stealth in the News Corp network and remained hidden for two years between February 2020 and January 2022. The post News Corp Hackers Hid...

Read More →

CybersecurityData SecurityNetwork Security

by

Can Tech Layoffs Increase Insider Threats?

Spiceworks speaks with experts who believe the sheer number of tech employees laid off recently can be a tad worrisome in terms of organizational security. The...

Read More →

CybersecurityData Security

by

The Cyber Risks Of Scaling: How To Secure Your Expanding Attack Surfaces

How to scale up while ensuring that your expanding attack surfaces are safe from cyber risks. The post The Cyber Risks Of Scaling: How To Secure Your Expanding...

Read More →

Data Security

by

Mobile Two-factor Authentication: Get Ready for the Next Phase

Are those ubiquitous four-digit text passcodes enough? What’s the future of two-factor authentication? The post Mobile Two-factor Authentication: Get Ready...

Read More →

Data Security

by

What Is a Proxy Server? Working, Types, Benefits, and Challenges

A proxy sits between the client device and the internet to regulate internet access and mask the client’s IP address. The post What Is a Proxy Server?...

Read More →

Close Search Window
Close