With new training and services, Fortinet aims to help customers bolster their cybersecurity team skills and address the skills shortage that can slow teams down.
cybersecurity as an enabler
For more than 30 years, Trend Micro has been protecting diverse devices, applications, and data. It continues to do so while also delivering high-value cybersecurity research.
Cybersecurity giant Trend Micro broadens its portfolio by acquiring SOC leader Anlyz; Kieron Allen explains the impact for customers and partners.
The latest release of cybersecurity vendor Lookout’s mobile phishing report indicates attacks are becoming more expansive — and expensive.
Software composition analysis tools are valuable assets to secure systems and protect organizations, says Frank Domizio, but they will also directly benefit software developers.
In ep. 33 of the Cybersecurity Minute, Frank Domizio explains how organizations have “tabletop training” for incident response in the event of a power outage or ransomware attack.
In episode 32, Chris looks at a new Cybersecurity Infrastructure Security Agency post that focuses on three critical steps for advancing vulnerability management across the ecosystem in IT.
In this Data Modernization Battleground moment, Chris says that cybersecurity professionals must understand data inventory, how businesses are using data, and who has access to data.
In this CloudWorld News Desk interview, Oracle Senior VP of Cloud Infrastructure Mahesh Thiagarajan explains why some users are still reluctant to engage with multi-cloud platforms.
In this Let’s Talk Data podcast, Quest Software’s Richard Rule explains why and how the LATAM region is “behind the curve” in data management.
In Cybersecurity Minute Episode 28, Chris Hughes discusses how malicious actors compromised more than 130 business organizations through poor two-factor authentication practices.
In this Cybersecurity Minute, Ep. 23, Chris Hughes details the CIS software supply chain security benchmark, which was developed alongside Aqua Security.
While zero-day vulnerability attacks still occur, new research emphasizes the need for basic security hygiene to protect against most advanced persistent threats.
Chris addresses reports that more than 80% of Kubernetes API servers are exposed to the public internet.
In today’s digitally-driven world, fostering cyber resilience in global, digital ecosystems is critical to ensure secure innovation.
Multi-cloud services are often associated with their own identities, permissions, authentication, and authorization activities.
In this Cybersecurity Minute, Chris discusses action being taken by the SEC to ensure cybersecurity expertise at the board level.
Data from Cloudflare exposes the top threats facing today’s web applications, including HTTP malformed requests, insecure API, & bots.
In this Cybersecurity Minute, Chris reports an advisory from federal agencies warning about nation-state hackers.
Security monitoring is one part of an overall effective security strategy. What tools will compliment your organizations strategy?