Technology integration exposes infrastructure to cyberattacks Security Staff May 30, 2023 From the disruption of fuel distribution to the interruption of emergency healthcare services, cyberattacks are no longer confined to cyberspace.Read More
68% of cybersecurity professionals work in a centralized IT model Security Staff May 8, 2023 A recent report by Torii found that 99% of IT professionals say they’re fulfilled in their jobs despite increasing SaaS spend concerns. Read More
Product Spotlight RSA Conference 2023 product preview Taelor Sutherland April 7, 2023 From hybrid-cloud solutions to risk management, Security magazine highlights recent products from security leaders attending the 2023 RSA Conference.Read More
2022 saw a 61% increase in the rate of phishing attacks Security Staff March 14, 2023 A 2022 SaaS report by SaaS Alerts analyzed new threat vectors, key areas of concern and potential security gaps in SaaS applications. Read More
Thirty-one percent of former employees still have company SaaS access Security Staff March 1, 2023 SaaS report quantifies the volume, types and exposure risk of business assets stored within the SaaS estates of medium and large companies. Read More
Organizations need a strategic approach to attack surface management Marc Gaffan March 1, 2023 An automated approach to security enables organizations to leverage their resources, minimizing attack surfaces and effectively addressing threats. Read More
Network visibility and security gaps due to remote work challenge IT Security Staff February 9, 2023 86% of IT teams support a remote workforce, but only half are performing SaaS and cloud monitoring or Wi-Fi management in hybrid environments.Read More
Building a stronger bond between IT and physical security Roy Dagan January 27, 2023 Physical security and IT teams need to work together when it comes to securing organizational networks and physical security technology.Read More
Shadow IT risk: A dangerous connection Andy Ognenoff Brian Soby January 23, 2023 The connected nature of today’s IT ecosystems increases the risks associated with shadow IT, the act of using unapproved third-party apps and software. Read More
Managing identity sprawl: How to take back control Anna Nordström January 11, 2023 Organizations need to take back control when it comes to identity and access management to avoid security and compliance risks.Read More