The Decade Ahead for Cybersecurity
By Matthew Gyde, CEO, Security, NTT Ltd. The Dawn of a New Era As 2020 dawns, we stand at the threshold of a new decade that’s certain to reveal challenges…
More Spending Won’t Solve Your Hardest IT Challenges In 2020 And Beyond. Here’s What Will.
By Chris Hallenbeck, CISO of the Americas at Tanium U.S. state and local governments have been observing the proposed State and Local Cybersecurity Government Act of 2019, especially since it…
Anomaly Detection Is the Next Cybersecurity Paradigm
It’s time to move beyond static lists of things forbidden and things allowed. By Aron Hsiao, Director of Marketing and Insights, Plurilock Static lists have long been at the heart…
Fraud: A Look Back At 2019 And What to Expect in The New Year
By Christina Luttrell, IDology The approach of the new year is a good time to reflect on the fraud landscape and its impact on businesses and consumers. Fraudsters continue to push…
Seven Security Predictions For 2020
By Corey Nachreiner, CTO of WatchGuard Technologies Each year, the WatchGuard Threat Lab research team examines the top emerging threats and trends across the information security landscape to develop predictions…
Getting PKI Right
Program Failures and How to Avoid Them By Chris Hickman, chief security officer, Keyfactor Public Key Infrastructure (PKI) has survived the test of time. Today, IT leaders and managers view…
Iot Security and Privacy
Security and Privacy in the IoT age By Lokesh Yamasani, Director – IT Security (Security Officer), Satellite Healthcare We are living in a digital age, let alone the so-called “Age…
Europe Cybersecurity Market Size to Steer At 13% CAGR To 2025
Europe Cybersecurity Market is estimated to be over USD 25 billion in 2018 and is expected to register a lucrative growth between 2019 and 2025 with a CAGR of over…
The Ultimate Guide to SSL/TLS Decryption
Six Features to Consider When Evaluating SSL/TLS Inspection Solutions By Babur Khan, Technical Marketing Engineer, A10 Networks Encrypted traffic accounts for a large and growing percentage of all internet traffic….
8 Common Types of Small Business Cyber Attacks
By Jonathan Krause, Owner, Forensic Control Whilst large scale cyber-attacks are well documented, there is also an increasing number of e-commerce small businesses at threat from targeted attacks. A report…
How to Know If Someone Is Watching You on Your Camera
In this era of video chatting and social media live streaming, your computer’s webcam can never be more relevant. By Anda Warner, Marketing Specialist, SEOforX In this era of video…
How To Mitigate The Risks Of Remote Desktop Protocol
By Chris Morales, head of security analytics at Vectra Remote Desktop Protocol (RDP) is an invaluable tool for any business wanting to save money and create efficiencies through centrally controlling…