Stay ahead of cyberthreats with expert insights and practical security .
Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
Attack surface management is the sustained monitoring, classifying, and inventory of a businesses IT infrastructure.
It sounds as simple as asset management, but ASM is different in the way it approac…
Businesses today are under increasing pressure to level up data security as ransomware and data theft continue to rise. Data-first security solutions provide businesses with next-generation protectio…
The Nature of Cybersecurity is undergoing rapid evolution. Cyber attacks are becoming more violent - and sophisticated. Big developments in tech over the last few years have led to some of the most …
In 2021, more than half of all widespread threats began with a zero-day exploit that was targetted by threat actors before vendors could even make patches available.
With security teams now being put…
When it comes to cybercrime and cybersecurity threats, social engineering attacks are unique in the way that they rely on human error versus software and operating system vulnerabilities.
This is bec…
Cyber insurance helps to provide critical cover for those who need protection against digital threats.
While businesses are responsible for their own cybersecurity, liability coverage can help provide…
Cyber risk intelligence is critical for businesses that operate in the digital world. It is the collection, evaluation, and analysis of cyber threat information by those with access to all-source inf…
CIAM enables organisations to securely capture and manage customer identity and profile data, as well as control customer access to certain applications and services.
Usually providing a variety of f…
Andy Ramgobin, Principal Technology Evangelist at Technimove, talks about the Science of Cyber Security & Cyber Resiliency Periodic Table and how enterprises can fully understand the digital threat l…
In this podcast, Richard Stiennon, Chief Research Analyst at IT-Harvest, joins Mackenzie Jackson, Developer Advocate at GitGuardian,
to explore Secrets Sprawl or the phenomenon of (unwanted) secrets d…
Testing application security challenges is essential to ensure that we are moving forward with cybersecurity technology, however many organisations are still unable to identify the key challenges wit…
Ensuring quality automotive products in the age of cyber crime is becoming harder and harder due to the amount of endpoints that can easily be compromised within the supply chain. Regardless of where…
Year on year, cybercriminals are expanding their attack toolkits and coming up with different ways to cause disruption across the enterprise. However, according to cybersecurity experts, deceptive te…
Within any sector, the automation of processes comes with technological, social and skill-gap orientated challenges, but cybersecurity really takes the cookie. The adoption of automation has certainl…
Building your career and starting a cybersecurity job comes with its perks, but it of course comes with its difficulties and shortcomings. Some people cite that the career can often result in low pay…
Implementing the best software security practices in 2021 is an absolute minefield when there are varying different softwares and technologies that all seem to be promising the same thing. For many a…
Since the Facebook-Cambridge Analytica data scandal of 2018, the populous has become so accustomed to data mismanagement and even data leaks that it no longer makes the headlines. In fact, even in 20…
Cybersecurity has revolved around several different methodologies over the last decade, but the arguments for and against using an approach based on "Indicators of Compromise" remain prevalent to thi…
When it comes to using a cybersecurity product, relying on new technology has often been seen as the primary objective. What cybersecurity experts are starting to realise, however, is that technology…
From the usage of anti-money laundering software all the way to endpoint security, the enterprise space is always preparing for the next attack. Recognising the fact that as much as you train and pre…