Cybersecurity Articles

Sorted By: Most Recent
Folake Dosu Folake Dosu
Updated on April 20, 2024

Security analytics startup TrueFort raises $13.7 million

Evolution Equity Partners led the round, which also saw participation from Lytical Ventures and Emerald Development Managers.

Misha Seltzer Misha Seltzer
Updated on April 20, 2024

Security or Productivity? For Businesses Using SaaS Platforms, It’s a Balancing Act.

CISOs, you’ve got a big job on your hands. Read on to learn about the threat and how to mitigate it.

Lior Bar-Lev Lior Bar-Lev
Updated on April 20, 2024

Your CISO Should Be Integral to Your Company’s Growth Planning

As the company grows, so does its threat landscape.

David Moose Wolpoff David Moose Wolpoff
Updated on April 20, 2024

The 3 Types of CISOs You Should Know

CISOs come in three different flavors, but only one makes it more expensive for a hacker to get inside — and has the level of clout to drive institutional change.

Tillmann Schwabe Tillmann Schwabe
Updated on April 20, 2024

Why You Need Mobile-Device Management to Protect Your Remote Workforce

As companies look to close cybersecurity gaps and relieve the pressure on IT teams, MDMs offer a clear fix. 

Brian Nordli Brian Nordli
Updated on April 20, 2024

Red Canary Explains What Happens After a Company Gets Hacked

Breaking down a breach with Red Canary’s response team.

Danny Lopez Danny Lopez
Updated on April 20, 2024

The Real Cost of Ransomware, and What Can Be Done About It

Data breaches keep getting bigger and more costly. How should an organization face this growing threat?

Alex Vakulov Alex Vakulov
Updated on April 20, 2024

Is the Source of the Next Big Data Breach Sitting in Your Conference Room?

LockBit and other ransomware has found the path of least resistance into corporate systems: They buy their way in, bribing insiders for access.

David Balaban David Balaban
Updated on April 20, 2024

Here’s What You Should Consider When Choosing a DLP System

These questions will help you determine whether a data loss prevention system will fit your needs.

Nancy Wang Nancy Wang
Updated on April 20, 2024

Evolve Your IT Strategy to Defend Against Ransomware Attacks

Protect your business assets by incorporating the PIDR data protection framework Nancy Wang uses in her work as a general manager at Amazon Web Services.