HomeCybersecurity

Cybersecurity

How Cyglass Brings Network Defense into the “As a Service” Market

The term "As a Service" is growing in popularity among vendors, IT and cybersecurity managers. After all, if one can transform a burdensome siloed...

5 Shortcomings of Legacy Firewalls for Internal Data Center Security

Day after day, companies of all sizes are victimized by cybercrimes and malicious insider threats. In fact in 2020, Verizon reports that there were...

Coming to Security Mandate Near You: SBOMs

The recent executive order will expand what companies must disclose to the government when a data breach occurs. Like the California Consumer Privacy Act (CCPA), these...

Making the Shift to a Hybrid Work Environment

Contrary to what many believed prior to early 2020, we now know the concept of the home office actually works. This is one of...

Zero Trust Access: 5 Key Points To Deploy ZTA to Your Network

The concept of “Zero Trust” was coined back in 2010, on the basis that traditional perimeter security models failed to provide adequate protection because...

Arkose Labs’ Kevin Gosschalk: The Fight Against Online Fraud

I spoke with Kevin Gosschalk, CEO and founder, Arkose Labs, about the state of online fraud. Among the topics covered: What’s the state of...

How Can You Prevent Ransomware?

Ransomware has been front page news for several weeks, after the Colonial Pipeline and JBS Meats incidents. It has even been discussed by the...

Citrix Secure Internet Access Simplifies Hybrid Workforce Challenges

The COVID-19 pandemic changed many things for workers. A year ago, most workers went into corporate offices to do their jobs. Today, almost all...

Congress Struggles to Control Facial Recognition

Have you ever walked up to someone at a cocktail party (remember those?) you thought you knew, started talking, only to realize that wasn’t...

RSA Conference Startup Competition Showcases Next Gen Cybersecurity

At the RSA Conference, cybersecurity startups compete in the famed Innovation Sandbox competition. This year’s entrepreneurs include authors of popular security standards, founders tied...