HomeCybersecurity

Cybersecurity

Kyndryl’s Kris Lovejoy on Enterprise Security Trends

I spoke with Kris Lovejoy, Global Practice Leader for Security and Resiliency at Kyndryl, about why conventional approaches to security are insufficient – and...

Can Cisco Secure the Multicloud?

Most organizations have adopted a multicloud strategy that creates a “mix and match” approach to security. Yet there's a problem with this reliance on...

Airiam’s Art Ocain on Preventing Fraud in the SME Market

I spoke with Art Ocain, VP of Cybersecurity and Incident Response at Airiam, about why small and mid-size enterprises are more prone to cyberattack...

4 Challenges of the SOC: How Decision Intelligence Can Help

Networks and the valuable data they hold are under attack as never before. That’s bad timing for today’s digital organizations, as they continue to...

It’s Time to Rethink Breach Management

Security breaches and breakdowns have become an unfortunate fact of life. With the average cost of a security breach reaching $4.24 million, it's critical...

IBM to Acquire Randori: Boosting Security via ‘Attacker’s Perspective’

Equating business with military strategies and tactics has been popular for years. In fact, not too long ago, you could scarcely attend an industry...

Kandji’s Chaim Mazal on Cybersecurity in the Era of Hybrid Work

I spoke with Chaim Mazal, CISO and SVP of Technology at Kandji, about how to handle the complex security problems created by today's shift...

How to Guard Against the Biggest Cloud Security Threats

IBM recently announced the results of a global study which found that data breaches in 2021 cost the companies studied $4.24 million per incident...

Agent vs. Agentless in Cloud Security: Why Both are Needed

When researching how to start with or even improve cloud security, it won’t take long to stumble upon some sort of agent versus agentless...

Security and Backup Alignment Critical to Ransomware Recovery

Ransomware continues to plague organizations all over the world. The most common entry points of ransomware into enterprise IT environments are phishing emails, malicious...