New data from Palo Alto Networks’ incident response team highlights the expanding set of extortion tactics being used as part of ransomware attacks.
Grip Security addresses the challenges of SaaS security by providing tailored insights and an agentless deployment mechanism among other advantages.
Universal access to healthcare information – including patient records – is still one of the healthcare industry’s biggest pain points. There are important advances taking place, however.
With artificial intelligence heading toward mainstream status, it’s time for CFOs to develop a game plan for implementing this powerful technology in their organizations.
Expert practitioner-analysts offer guidance on safeguarding critical data from cyberattacks, including prioritizing data types and preventing silos, as well as ways to protect against data leakage and ransomware.
Tony Uphoff makes a case for cybersecurity as a growth driver, and offers five ways that CEOs can capitalize on it today.
CISO and Acceleration Economy analyst Rob Wood explains the benefits for security leaders of knowing where data exists. Without knowing, leaders cannot do anything with it.
The Biden-Harris administration unveiled an updated National Cybersecurity Strategy to standardize cybersecurity practices across agencies and encourage market accountability.
There are many benefits to using the zero trust maturity model as a framework for cybersecurity planning and implementation, say Rob Wood.
Generative AI offers many opportunities to enable businesses, but also comes with security implications. Learn the impact on the future of work and how Generative AI is redefining the customer experience.
In this Cloud Data Strategy moment, Chris Hughes defines the areas of focus security leaders must consider when safeguarding data in the cloud.
As sustainability becomes a key focus for businesses and critical infrastructure, organizations must also prioritize cybersecurity and secure data standards to safeguard emerging technologies like IoT and OT devices from evolving cyber threats.
Wayne Sadin outlines why an overreliance on Microsoft Excel models is increasingly a problem for companies of all sizes and industries.
New data from cybersecurity provider Chainguard captures what’s working, and the relative difficultly levels, of various software supply chain practices.
New data from NetApp shows that even with the benefits of multi-cloud, this increasingly popular architecture introduces various forms of complexity for tech leaders.
Multi-cloud incident response is more complex than traditional incident response. Frank Domizio explains how and why organizations need to adapt.
Though it makes for complex sourcing, healthcare cloud migration can be successfully approached with some classic procurement techniques, writes Joanna Martinez.
Maturity models serve as roadmaps to help organizations successfully navigate their zero-trust journey. Rob Wood breaks down the benefits of one model’s iterative approach.
Environmental, social, and governance frameworks are on the rise, and they must be crafted with enough security considerations to ward off increased cyber threats.
Every company today is — or is on its way to becoming via digital transformation — a technology company, but where does all the technology come from? Partners ecosystems.



















