Cybersecurity giant Trend Micro broadens its portfolio by acquiring SOC leader Anlyz; Kieron Allen explains the impact for customers and partners.
Cybersecurity
The considerable benefits of multi-cloud architecture must be weighed against challenges like complexity and governance.
The right people, processes, and technology can help mitigate the security risks of a multi-cloud environment, says analyst Frank Domizio.
Multi-cloud provides flexibility, scalability, and cost efficiency, but securing this architecture requires a comprehensive approach. Frank Domizio explains.
Multi-cloud is a key driver of digital transformation for many organizations, but it’s not always easy to get your workforce on board. Here’s how.
Robert Wood takes a look at multi-cloud implementation and its implications for security.
Technology leaders may encounter resistance from their teams regarding multi-cloud transitions. Rob Wood advises how to handle it and move forward.
Lookout Strategy Chief Aaron Cockerill drills into the company’s State of Mobile Phishing Report and says education is a key tactic to reduce the threat.
A data governance framework is critical for an organization’s cybersecurity strategy. Frank Domizio explains why.
Annual mobile phishing report from security vendor Lookout has troubling findings about volume, complexity, and impact of phishing attacks. Kieron Allen reviews the findings, and how to respond.
The latest Growth Swarm podcast covers what practitioners must do to manage their businesses and technologies in today’s volatile economy.
The rise of software-as-a-service presents new business opportunities, but also new security challenges that need to be balanced with business enablement to ensure growth and protection. This guidebook on Securing Software-as-a-Service Applications, underwritten by Lookout, provides expert insights on how to integrate SaaS securely into businesses.
Security data often ends up distributed across many systems, which can be an issue when searching for threats. CISO Rob Wood advocates a more centralized approach.
Wayne Sadin shares why the advent of generative AI puts pressure on organizations to tighten up their data and security strategies to avoid bias and protect sensitive data.
Knowing the types of data that cybercriminals target for identity theft, financial fraud, or other malicious activities helps security teams implement effective protection.
GitGuardian addresses a critical and widespread problem: developers storing secrets, such as API keys, in repositories where they can be visible to nefarious actors.
Conway’s Law is a useful lens through which to examine security in large organizations, says analyst Robert Wood, noting that silos introduction friction.
Janet Schijns defines how AI apps, supported by partners, can automate everything from repetitive tasks to supply chains for better operational efficiency.
GitGuardian, a Cybersecurity Top 10 Shortlist company, offers a secrets detection platform that ensures source-code security for the DevSecOps era.
Frank Domizio explains how partnering with a CISO can provide expertise, tools, and support to ensure that sensitive data remains secure.