Unless your current threat management program is fully capable of securing internet of things (IoT) devices, you could likely benefit from attending an IoT security summit to learn what other industry leaders are doing to discover, analyze and protect unmanaged devices. As a chief information security officer (CISO) or other…
Read More
It’s always exciting to announce the results of our annual Cost of a Data Breach Report, and this year, the 14th report conducted by the Ponemon Institute, the 2019 Cost of a Data Breach Report offers new and innovative ways to analyze the financial impacts, root causes and mitigating factors…
Read More
According to IDC, Google Android is expected to capture 86.7 percent of the worldwide operating system market by the end of 2019, continuing to show growth from the already eye-popping 85.1 percent reported last year. The popularity of Android lends itself to not only consumer usage, but also its massive…
Read More
The complexity and precision of today’s cyberattacks may make you long for the simpler days of the Michelangelo virus. Add the sheer number of security alerts and false positives, and it’s easy to understand why incident response teams suffer burnout, leaving organizations at risk. Incident response is the process of…
Read More