Category: Security

  • Choosing the right VPN for your business

    Choosing the right VPN for your business

    Online privacy threats are increasing, making virtual private networks (VPN) more important than ever for businesses and individual users alike. But the sheer number of VPN providers can make choosing…

    Read more: Choosing the right VPN for your business
  • Shadow IT risks in the age of SaaS: Risks you can’t see (but must control)

    Shadow IT risks in the age of SaaS: Risks you can’t see (but must control)

    Employees may download Software-as-a-Service (SaaS) applications to share files or manage projects without first getting approval from the IT department. While these shortcuts may appear harmless, they silently build a…

    Read more: Shadow IT risks in the age of SaaS: Risks you can’t see (but must control)
  • Modern password tips based on NIST guidelines

    Modern password tips based on NIST guidelines

    Passwords are an inherently flawed security measure in an era of constant phishing attacks and massive data leaks. This guide breaks down the latest recommendations from the National Institute of…

    Read more: Modern password tips based on NIST guidelines
  • Zero trust in practice: Implementing a zero trust security model for mid-sized enterprises

    Zero trust in practice: Implementing a zero trust security model for mid-sized enterprises

    In modern business, evolving IT environments require you to shift the way you approach data protection. A zero trust security model fundamentally changes the rules by assuming threats already exist…

    Read more: Zero trust in practice: Implementing a zero trust security model for mid-sized enterprises
  • Cybersecurity and resilience: Building a culture of preparedness

    Cybersecurity and resilience: Building a culture of preparedness

    With businesses under constant risk of attack and disruption from complex and evolving threats, it’s imperative to develop not only a cybersecurity system but also a cyber resilience plan to…

    Read more: Cybersecurity and resilience: Building a culture of preparedness
  • Not all hackers are criminals: A look at the three major hacker types

    Not all hackers are criminals: A look at the three major hacker types

    While the term “hacker” often dominates cybersecurity conversations, it’s crucial to recognize that not all hackers share the same motivations. Some exploit vulnerabilities, others help organizations fix them, and some…

    Read more: Not all hackers are criminals: A look at the three major hacker types
  • IT security compliance as a competitive edge: Turning regulatory burdens into market wins

    IT security compliance as a competitive edge: Turning regulatory burdens into market wins

    Most business leaders view regulatory requirements as a grudge purchase — a necessary tax on doing business that drains resources and distracts from revenue-generating work. However, in a market where…

    Read more: IT security compliance as a competitive edge: Turning regulatory burdens into market wins
  • The hidden weaknesses of multifactor authentication

    The hidden weaknesses of multifactor authentication

    Multifactor authentication (MFA) works by requiring users to provide more than one form of identification when logging into a system or account. This extra layer of security is meant to…

    Read more: The hidden weaknesses of multifactor authentication
  • The boardroom language of risk: How to translate cyberthreats into cybersecurity ROI

    The boardroom language of risk: How to translate cyberthreats into cybersecurity ROI

    Picture a CISO presenting a heat map of thwarted attacks to the board. The directors stare at the screen, attempting to make sense of the colors, before asking the only…

    Read more: The boardroom language of risk: How to translate cyberthreats into cybersecurity ROI
  • 2026 Cybersecurity trends and predictions

    2026 Cybersecurity trends and predictions

    Cybersecurity experts Rob Wright (Dark Reading), David Jones (Cybersecurity Dive), and Alissa Irei (TechTarget Search Security) recently came together to discuss the future of online security. Let’s take a look…

    Read more: 2026 Cybersecurity trends and predictions