In the last few decades, we've seen cybercrime transform from an activity perpetrated by independent lone actors into an increasingly professional business endeavor in pursuit of profit.
Cybercriminals communicate and collaborate, working together and exchanging information on the deep and dark web. But what exactly is up for sale on these underground markets and what does this tell us about threat actor behavior and motivation?
As the enterprise IT landscape has become more complex, security is no longer a matter of simply securing the network perimeter. The cloud and remote workers now have to be part of the equation too.
In order to cope with this, more and more businesses are turning to the use of zero trust methodology. We spoke to James Carder, CSO of SIEM platform LogRhythm to find out more about why this is a technology whose time has come and how it can be implemented effectively.
Read about any new cybersecurity product today and the chances are that it will be keen to stress its use of AI in some form.
But are we expecting too much from AI and are companies adopting it just because it's on trend? We spoke to Nadav Arbel, co-founder and CEO of managed SOC platform CYREBRO, to find out more about AI's role and why the human factor is still important.
Databases are employed by all kinds of businesses, but deciding which one to use can be a tricky decision. Once you've chosen a solution it’s a lot of work to switch to a different one.
But also different stakeholders within the enterprise have different requirements from a database and different views on which features are important.
Ransomware is a major problem and ideally while you'd like to avoid being attacked, the chances are that at some point you're going to be a target.
So, what happens following an attack and what should organizations be doing immediately afterwards to lessen the impact? We spoke to Ed Williams, EMEA director of SpiderLabs at Trustwave, to find out and to get some tips on how to proactively secure against ransomware attacks in future.
Data is increasingly important to companies, but making effective use of it presents a number of challenges.
NoSQL database company DataStax has recently launched its new Astra Streaming service. Based on Apache Pulsar this aims to make it easier for developers who want to run their application streaming alongside their database instances like Cassandra.
Phishing remains one of the most popular attack vectors for cybercriminals. But traditional defenses relying on filtering or raising user awareness via training aren't always effective.
We spoke to Lior Kohavi, chief technology officer at enterprise SaaS security specialist Cyren to discover how a new approach is using genuine attacks to help both educate users and keep phishing emails out of our inboxes.
There's been a huge proliferation of Internet of Things devices in recent years, but along with this has come a whole range of new security and privacy concerns.
How are IoT devices secured -- if they are at all -- and what are they doing with our data? We spoke to Rob Shavell, co-founder and CEO of Aine/DeleteMe to talk about security gaps, privacy concerns and more.
Most cybersecurity focuses on keeping out threats, but there's an increasing view that everyone is going to get breached sooner or later and that protecting data is key to keeping a business safe.
We spoke to Kurt Mueffelmann, global chief operating officer of Nucleus Cyber -- which has recently been acquired by Australian access control company archTIS -- to find out more about how this approach works.
Over the last couple of years the number of ransomware attacks has soared. While high profile attacks make the headlines organizations of all sizes are at risk.
One of the keys to stopping attacks is to prevent them from moving laterally through networks. We spoke to Amit Serper, area VP of security research for North America at microsegmentation specialist Guardicore to get his view on how businesses can protect themselves.
Everyone knows that businesses systems are a target for a range of attackers. But it's easy to become complacent about security and finding vulnerabilities can be difficult.
Testing your security is therefore vital, and can uncover things that you might not otherwise be aware of.
Internet of things devices pose a number of challenges for developers, not least security issues and having to work with limited hardware capability.
We talked to François Baldassari of connected device specialist Memfault to find out why it may be better if IoT device developers and engineers were to have the kinds of DevOps tools that only software teams have traditionally had access to.
As businesses begin to announce their intentions to bring employees back into the office, many employees have publicly pushed back. People don't want to go back into work and incur all of the stresses that come with it, including lengthy commutes, parking fees, and a loss of work-life balance.
Zach Dunn co-founder and VP of customer experience at Robin has helped hundreds of companies, including Twitter, Peloton, and Toyota, to execute comprehensive return to office (RTO) strategies that have run smoothly and paved the path towards an effective hybrid workplace model.
One of the side effects of the COVID-19 pandemic has been a boost to online shopping. This has increased pressure on companies offering eCommerce to adapt quickly to the new business model.
But how well have businesses -- particularly smaller ones -- coped with this and what should they be focusing on as we move forward?
We're all familiar with the term 'big data' but not perhaps with 'open data'. Open data is information that can be freely reused and distributed, it's often linked with mixing datasets too.
But what challenges does dealing with open data present for enterprises? We spoke to Mo Ladha, product manager at content services platform Hyland, to find out.