Tag: IT Management
-
The Security Implications of Application Proliferation
Data Point No. 4: Organizations don’t feel confident about their …
-
Why SecOps is Needed Now More Than Ever: Three Necessary Steps
It seems everything around us is getting smarter: smart phones, smart cars, smart thermostats, smart refrigerators, smart TVs, smart …
-
The Best Cybersecurity Strategy: Comprehensive Asset Management
It’s not a sexy, cutting-edge algorithm, but research shows comprehensive asset management is your best tool to mitigate the most …
-
The Argument for a National US Data Privacy Framework
Against the backdrop of escalating cybercrime and data breaches throughout 2020 and 2021, state legislators in over 29 US states have …
-
F5 Acquires Threat Stack, Continuing Its Transition to a Security Company
F5 has announced an agreement to acquire Boston-based Threat Stack for $68M. The purchase of Threat Stack is F5’s fourth acquisition in …
-
Using Personal Data for Analytics Requires Balancing Accessibility and Security
Digital transformation of financial services is driving an increasingly automated analytics process in which personally identifiable …
-
#eWEEKchat September 14: Trends in Data Storage, Protection and Privacy
On Tuesday, September 14, at 11 AM PST, @eWEEKNews will host its monthly #eWEEKChat. The topic will be “Trends in Data Storage, …
-
The File Data Factor in Ransomware Defense: 3 Best Practices
Aside from the pandemic, ransomware has become one of the gravest threats to the global economy. It is no longer a matter of “if” an …
-
Protecting Machine IDs in Multi-Cloud: 5 Techniques
Automation through digital transformation initiatives that rely on cloud-based applications is driving a surge in the use of machine …
-
What New Data Privacy Legislation Means for SaaS Users
Making multiple copies of data for reuse results in more touchpoints and potential access points for cybercriminals. Downloading and …
-
How Sectigo Certificate Manager Removes the Chaos of Enterprise PKI
Organizations are relying more and more on PKI (Public Key Infrastructure) certificates to protect critical resources. While that in …
-
Cybersecurity Warning: Lateral Movement Tactics Security Experts Should Recognize
One of the most curious elements of this year’s cybersecurity Verizon Data Breach Investigations Report (DBIR) was the inclusion of the …
●●●