data
Passkeys Can Make Passwords a Thing of the Past
We all seem to have a love/hate relationship with passwords. Over time, we have learned to live with them–even when, time and again, they show how bad they are at securing our ...
Identity Security a Top Priority as Threats Evolve
The need to secure digital identities is one of the biggest privacy and data issues facing organizations today, and with less than half of organizations (49%) proactively investing in securing identities, there ...
Who Owns Security in Multi-Cloud Operations?
The best-kept secret is the one that is never shared. In today’s technology environment, that is even more true. Where organizations used to build and maintain their own technology stacks, now they ...
Identity Governance: Right People, Right Access, Right Time
Enterprise companies are increasing spending on software-as-a-service (SaaS) tools to enhance employee productivity and drive digital transformation projects. In doing so, IT teams are facing new challenges to ensure the right level ...
A 2023 Mantra: Think of Cybersecurity Risk as Business Risk
The line between business risk and cybersecurity risk has been obliterated. Increasingly, companies cannot separate risk models built around financial uncertainty and legal liabilities from IT security risk. For risk management officers, ...
How Demanding Conditions Impact Critical Infrastructure Security
Enterprises already understand how important a role physical security plays in protecting their staff, work environments and privileged information from outsiders. Fences, walls, security guards and RFID-controlled doors all help organizations protect ...
What you Missed in the White House National Cybersecurity Strategy
On the heels of the White House’s National Cybersecurity Strategy, there were plenty of reactions and opinions about how cybersecurity strategies and priorities must change. But most people missed one critical callout: ...
How Zero Trust Enables the National Cybersecurity Strategy
5 min read The recently released US National Cybersecurity Strategy stresses a commitment to the application of a zero-trust architecture as well as the modernization of both IT and OT systems. The ...
Lessons Learned from the Ongoing LastPass Data Breach Saga
5 min read The LastPass data breach debacle could happen to anyone. We break down the ongoing attacks and offer tips for avoiding a similar fate. The post Lessons Learned from the ...
Understanding Pseudonymization and Anonymization
Maintaining an engaged workforce is a requirement in a competitive market. An engaged workforce is more productive. A study by Gallup found companies with highly engaged teams were 21 per cent more ...