Practically everything consumers do online — shopping, paying bills and signing up for new services — requires some level of personal data sharing or changing privacy settings. Consumers need to feel that your organization’s digital experiences are worth trusting and that their data will be used for only its intended…
Read More
Organizations undertaking the move to the cloud face a blizzard of sometimes confusing buzzwords. There’s hybrid cloud, multicloud, digital transformation, microservices and so much more. While these terms can be confusing, the key element to keep in mind is that cloud data security should be an inherent part of business-level…
Read More
March is Women’s History Month, so it’s a perfect time of the year to look back and see how far women in cybersecurity have come. From pioneering tech to achieving a gender-equal future in today’s world, it’s a story of invention, strength and achievement. A Brief History of Women in…
Read More
As hospitals get smarter, threat actors have more routes inside. IBM’s recent research on the health care industry shows how smart tools, which could be very valuable for today’s medical facilities, also need healing of their own. What should hospital IT security teams look out for? Our overview of the state…
Read More