Tag: IT Security
-
IT and OT cybersecurity: A holistic approach
In the realm of cybersecurity, both information technology (IT) and operational technology (OT) present distinct challenges that …
-
83% of IT Security Professionals Say Burnout Causes Data Breaches
CAMBRIDGE, Mass. – …
-
Shadow IT: Security policies may be a problem
3 out of 4 workers use personal (and often unmanaged) phones and laptops for work and nearly half of companies let unmanaged devices access …
-
A Penetration Testing Buyer’s Guide for IT Security Teams
The frequency and complexity of cyber threats are constantly evolving. At the same time, organizations are now collecting sensitive data …
-
IT Security Pro Jailed for Attempted Extortion
A former IT security analyst has been jailed for three years and seven months after attempting to extort his employer, according to UK …
-
2023 Women in IT Security: Call for nominations
We are thrilled to open nominations for SC Media’s 2023 Women in IT Security program. In its’ tenth year, this program celebrates women …
-
Only 39% of IT Security Decision-Makers See it As Business Enabler
A recent survey of over 2000 IT security decision-makers has revealed that less than half (39%) believe their company’s leadership has a …
-
2023 IT Security Predictions From Professionals Who Live It Every Day
We’re now in the fourth quarter, which means leaves are changing color, kids are creating lofty shopping lists, and their moms are …
-
3 Keys to an Effective Enterprise IT Risk Management Strategy
The average cost of a data breach hit a record high of $4.35 million, a 13% increase in the last two years, according to the 2022 Cost of a …
-
IT Security Takeaways from the Wiseasy Hack
The Wiseasy hack underscores the importance of adhering to long established security best practices such as requiring multifactor …
-
Modern IT Security Teams’ Inevitable Need for Advanced Vulnerability Management
We have read enough and more news in recent times on the surge in cyberattacks. It is crystal clear that attackers are not leaving out even …
-
Comprehensive, Easy Cybersecurity for Lean IT Security Teams Starts with XDR
Comprehensive, easy cybersecurity for lean IT security teams starts with extended detection and response (XDR).” Download the eBook …
●●●