Cyber Resilience Insights

SUBSCRIBE NOW

Email Security, Web Security
U.S. Government and Industry Aim to Secure 5G Networks

Leadership changes in Washington coincide with the early-phase launch of 5G networks, whic… Read More >

Leadership changes in Washington coincide with the early-phase launch of 5G networks, which could accelerate policy on 5G cyber and network security in 2021.  Key Points: The business promise of 5G networks can only be realized if they are secure, despite new cyber risks on a vastly expanded a… Read More >

Karen Lynch

by Karen Lynch

Contributing Writer

Posted Dec 11, 2020

Web Security, Threat Intelligence Hub
FireEye Attack Raises the Bar on Cyber Resilience for E…

Threat actors steal ‘whi… Read More >

Threat actors steal ‘white hat’ tools, but FireEye publishes countermeasures to help the cybersecurity commu… Read More >

Mike Azzara

by Mike Azzara

Contributing Writer

Posted Dec 10, 2020

Email Security, Web Security
Artificial Intelligence in Cybersecurity: Where are We on the Technology Adoption/Hype Cycle?

You likely have noticed how prevalent artificial intelligence (AI) and its related terms s… Read More >

You likely have noticed how prevalent artificial intelligence (AI) and its related terms such as machine learning, neural networks, and big data analytics have become in the last several years in the world of cybersecurity. Doesn’t it make sense for the security industry to be searching for th… Read More >

Matthew Gardiner

by Matthew Gardiner

Principal Security Strategist

Posted Aug 27, 2020

Web Security
Browser Isolation: An Essential New Web Security Layer

Key Points: Browser isolation… Read More >

Key Points: Browser isolation is an additional security layer that protects people, systems, and networks by completely… Read More >

Bill Camarda

by Bill Camarda

Contributing Writer

Posted Jul 31, 2020

Email Security, Web Security
Integrating Security Products is Vital for Cyber Resilience

The pace of tech innovation combined with the cyber arms race means integrating cybersecur… Read More >

The pace of tech innovation combined with the cyber arms race means integrating cybersecurity products is essential to keep up with fast-evolving threats. Open APIs are key. Key points: The ability to rapidly integrate best-of-breed security products is crucial to staying ahead of fast-evolving th… Read More >

Mike Azzara

by Mike Azzara

Contributing Writer

Posted Jul 29, 2020

Web Security
Managing Security for a Remote Workforce: Mimecast IT’…

Two Mimecast IT and internal s… Read More >

Two Mimecast IT and internal security leaders share what they’ve learned about managing and securing a massive inc… Read More >

Bill Camarda

by Bill Camarda

Contributing Writer

Posted Jul 20, 2020

Popular Posts

Older Posts

Security, Web Security

Remote Working Makes Web Security Vital

As pandemic-spurred remote working becomes a permanent arrangement for many organizations, cloud-based web security gateways help to safeguard a distributed workforce and enforce compliance.   Key Points: Although increases in remote working we…

Read More >

Security, Web Security

Security’s “New Normal”: Remote Working Supercharges the Shift to Cloud Security

451 Research analyst Scott Crawford describes how IT organizations will increasingly leverage cloud security to safeguard more widely distributed people, assets, and networks. Key Points: The long-term increase in remote working and the growth in co…

Read More >

Web Security, Coronavirus

10 Steps To Maintain Web Security (And Sanity) While Working From Home During Coronavirus

Governments across the globe have put extreme measures in place to limit the spread of coronavirus, prohibiting large public gatherings, closing schools and day care facilities, and encouraging “social distancing” to keep new coronavirus…

Read More >

Security, Email Security, Web Security

How to Address Cybersecurity Vendor Acquisitions

How to Address Cybersecurity M&A in Your Security Environment The role of cybersecurity and the overall importance of ensuring CISOs have a seat at the table for the acquisition process in its entirety is well documented; the value of data and t…

Read More >

categories

Read More >

View More

Popular Posts