Archives
State of Security Posture Report [Balbix]
The 2022 State of Security Posture Report reveals that cybersecurity teams are struggling to measure and improve their security posture as their organizations move...
Threat Detection and Response Report Opportunity
The THREAT DETECTION & RESPONSE REPORT is a unique opportunity for cybersecurity marketers to receive fact-based thought leadership content, quality leads, and brand visibility...
The State of Passwordless Security 2022 [HYPR]
The long-standing, oft-deferred security threat posed by password-based authentication is now front and center. Some of the most damaging cyberattacks in the past year...
The New Multi-factor Authentication is Passwordless
By now we all know that data and systems will never be secure using passwords for authentication. However, traditional multi-factor authentication (MFA) means extra...
Email Security: The Confidence Game [Fortinet]
IT and Security pros are increasingly confident that their email security defenses are up to the challenge of successfully guarding against today’s email-based threats....
Best Practices for Enabling a Security Application Lifecycle in AWS
The call for faster innovation cycles and a shift to cloud-native application architectures is driving complexity and expanding the attack surface. The current skills...
2021 Network Detection and Response Report [ENEA Qosmos]
Recent high-profile incidents at companies like SolarWinds, Microsoft, T-Mobile, Facebook, Colonial Pipeline, JBS and Acer highlight the significant harm caused by advanced cyberattacks. These...
2022 Ransomware & Malware Report [Bitglass]
(To download the 2022 Malware & Ransomware Report, please see link at right.)Malware and ransomware continue to wreak havoc as some of the most...
2022 Endpoint Security Visibility Report [Tanium]
The 2022 Endpoint Security Visibility Report reveals real impacts to business when there is a security incident. The report highlights what is and what...
Zero Trust Report Opportunity
The ZERO TRUST REPORT is a unique opportunity for cybersecurity marketers to receive fact-based thought leadership content, quality leads, and brand visibility in the...
MOST POPULAR
How to Quickly Recover After a Third-Party Data Breach
I write all the time about how to prevent ransomware attacks and how the root cause in so many cases is an improperly secured...