Archives
The 2024 State of Cloud-Native Security
In an era marked by the swift transition to hybrid work, an expanding multi-cloud attack surface, and a notable cybersecurity talent gap, organizations are...
2024 Cloud Security Report [Fortinet]
Companies are increasingly pursuing a cloud-first strategy by developing and deploying applications with the cloud in mind. With the majority of organizations adopting a...
2024 Cloud Security Report [Trend Micro]
Cloud security continues to be a critical concern as organizations increasingly leverage multi-cloud environments to drive business growth and innovation. While cloud technologies offer...
Considerations for a Successful Azure Application Security Program
As the attack surface continues to expand and cybercriminals are becoming more sophisticated, it creates more blind spots and raises risk. This exposure is...
2024 Application Security Report [Fortinet]
In today’s digital ecosystem, the expansion of application and API landscapes offers both opportunities and challenges for organizations. Advancements in application development and integration...
How to Mitigate Emerging Security Threats from Third Parties
Organizations are overwhelmed with the influx of security alerts for indicators of compromise, yet many lack the necessary resources to thoroughly investigate even a...
From Concept to Action: Embracing Zero Trust with a Security Service Edge (SSE) Platform
Join us as we bring together experts from HPE Aruba Networking and Cybersecurity Insiders for an in-depth discussion on how the right access technology...
2024 Security Service Edge Report [HPE]
Hybrid work is the new reality for many businesses, but it also poses new challenges for cybersecurity. CISOs and security architects need to rethink...
The Truth about VPN: Mitigating Risk in the Age of Remote Work
In this session, we bring together experts John Spiegel, Field CTO at HPE Aruba Networking and Holger Schulze with Cybersecurity Insiders to dissect the...
2024 VPN Risk Report [HPE]
In the past, Virtual Private Networks (VPNs) have been the go-to solution for remote access. However, with the surge in remote work and distributed...
MOST POPULAR
How to Quickly Recover After a Third-Party Data Breach
I write all the time about how to prevent ransomware attacks and how the root cause in so many cases is an improperly secured...