2 min read - Security researchers discovered a new fileless malware strain targeting bank customers in Brazil and Thailand with a hack tool and at least two infostealers.
4 min read - Organizations that do not establish a security-first culture will struggle to deliver on their customer-first initiatives.
7 min read - To gain the buy-in you need to make your IAM program successful, it's important to consider your employees' goals and needs during the design process.
3 min read - With a little education and a lot of communication, security leaders can steadily reduce employee negligence over time through consistent, comprehensive awareness training.
4 min read - Some refer to information security as a war, but it's better to think of it as a game. To win the cybersecurity game, you need to immerse yourself, practice and retrain regularly.
2 min read - Cloud gaming service Steam pulled a game from its library on July 30 after users reported that it was actually a cryptojacking scam.
3 min read - Protecting endpoint-generated data is the name of the game in cybersecurity today. However, increasing shares of shadow IT devices in the workplace are making app security a more significant challenge.
5 min read - Follow along with risk and compliance officer Frank Roth as he endeavors to fill in the gaps of an outdated (and incomplete) risk management framework in his new role at a utility company.
2 min read - A managed cloud access security broker (CASB) can help organizations gain visibility into shadow IT by monitoring all data transferred between the cloud and on-premises infrastructure.
3 min read - Security teams need a single, scalable cloud solution that integrates seamlessly with a SIEM platform to identify shadow IT — and cut through the fog of cloud security.
Analysis and insights from hundreds of the brightest minds in the cybersecurity industry to help you prove compliance, grow business and stop threats.