Data Protection September 27, 2019 How Do You Secure a Smart City? 5 min read - Cybersecurity investments are rarely discussed during a smart city's strategic process. As smart cities become more complex, governments may be forced to play a continuous game of catch-up.
Risk Management September 18, 2019 The Future of Cybercrime: Where Are We Headed? 3 min read - By 2024, the collective cost of data breaches will reach $5 trillion, according to a study by Juniper Research. This is just one indication of how the future of cybercrime will impact us.
Software Vulnerabilities September 12, 2019 The Art of Patch Management 4 min read - The vagaries of systems and organizations, compounded by the irrationality of the human mind and variations in patches themselves, means that patch management is not an exact science — it's an art.
September 2, 2019 Weekly Security News Roundup: TrickBot Adds Capabilities to Target US Mobile Users 3 min read - Security researchers came across a new variant of TrickBot that arrived with new features allowing it to target U.S. mobile users. Learn what else happened last week in security news.
Data Protection August 30, 2019 How to Know if Your Cybersecurity Tools Are Actually Working 3 min read - It's time to turn that nagging feeling of uncertainty about the efficacy of your cybersecurity tools into an action plan for gaining the visibility you need.
Security Services August 27, 2019 M&A Security Considerations and the Importance of Due Diligence 4 min read - Organizations that fail to assess the risk posture of an acquisition target in accordance with M&A security best practices could expose themselves to data breaches, IoT security threats and more.
Incident Response August 26, 2019 What Is SIEM and How Does It Enhance Threat Detection? 3 min read - What is SIEM? Security information and event management helps organizations detect threats via fine-grained, real-time visibility into on-premises and cloud-based activity.
Endpoint August 21, 2019 Securing the Industrial Internet of Things in the Utilities Sector 4 min read - While the industrial internet of things has clear benefits, IIoT environments also have the potential to expose high-value assets or services to a larger attack surface.
News August 16, 2019 7 Can’t-Miss Cybersecurity Lessons From Black Hat USA and Vegas Security Week 5 min read - Black Hat USA and DEF CON revealed some shocking developments in IoT and biometric security, providing important cybersecurity lessons for enterprise security professionals.
Endpoint August 13, 2019 UEM’s Sophomore Year: ‘2019 Gartner Magic Quadrant for Unified Endpoint Management Tools’ 4 min read - IBM was named a Leader in the "2019 Gartner Magic Quadrant for Unified Endpoint Management" for its ability to execute and lead the entire field of vendors in its completeness of vision.