
10 Ways Cybersecurity Can Protect COVID-19 Vaccine Supply Chains
The Pharma industry has lost $14 billion through Intellectual Property (IP) cyber theft worldwide much of it focused on vaccine development, according to the United Kingdom Office of Cyber Security and Information Assurance. 53% of pharmaceutical IP thefts and related breaches are carried out by someone with insider access also according to the United Kingdom […]

Securing Machine Identities Needs To Be A Top Cybersecurity Goal In 2021
Bottom Line: Bad actors quickly capitalize on the wide gaps in machine identity security, creating one of the most breachable threat surfaces today. Why Machines Are the Most Challenging Threat Surface To Protect Forrester’s recent webinar on the topic, How To Secure And Govern Non-Human Identities, estimates that machine identities (including bots, robots and IoT) are growing […]

Dissecting The SolarWinds Hack For Greater Insights With A Cybersecurity Evangelist
Bottom Line: Cyberattacks enter a new era of lethal impact when threat actors are sophisticated enough to compromise SolarWind’s software supply chain with infected binary code while mimicking legitimate protocol traffic to avoid detection. To gain greater insights into the SolarWinds breach, its implications on cybersecurity strategy in the future and what steps enterprises need […]

Centrify’s New CEO Has A Compelling Vision For The Future Of Cybersecurity
Bottom Line: Flint Brenton’s vision for the future of Centrify and cybersecurity, in general, prioritizes the need for privileged access management to become core to the multi-cloud architectures and DevOps environments he sees pervading customers’ enterprises today. Every new cybersecurity company CEO is writing their vision of the future by their decisions and the priorities […]

83% Of Enterprises Transformed Their Cybersecurity In 2020
73% of enterprises (over 500 employees) accelerated their cloud migration plans to support the shift to remote working across their organizations due to the pandemic. 81% of enterprises accelerated their IT modernization processes due to the pandemic. 48% of all companies surveyed have accelerated their cloud migration plans, 49% have sped up their IT modernization […]

Dissecting The Twitter Hack With A Cybersecurity Evangelist
Bottom Line: Shattering the false sense of security in tech, the recent Twitter hack blended altruism, fame, greed, social engineering via SIM swapping and insider threats to steal $120,000 from victims when the economic and political damage could have been far worse. Targeting the most influential celebrities on Twitter, hackers orchestrated a social engineering-based attack […]

5 Mistakes That Threaten Infrastructure Cybersecurity And Resilience
Bottom line: With many IT budgets under scrutiny, cybersecurity teams are expected to do more with less, prioritizing spending that delivers the greatest ROI while avoiding the top five mistakes that threaten their infrastructures. In a rush to reduce budgets and spending, cybersecurity teams and the CISOs that lead them need to avoid the mistakes […]

Debunking The Myth That Greater Compliance Makes IT More Secure
Bottom Line: Excelling at compliance doesn’t protect any business from being hacked, yet pursuing a continuous risk management strategy helps. With a few exceptions (such as spearphishing), cyberattacks are, by nature, brutally opportunistic and random. They are driven to disrupt operations at best and steal funds, records, and privileged access credentials at worst. Conversely, the […]

Protecting Privileged Identities In A Post-COVID-19 World
Bottom Line: Every organization needs to digitally reinvent their business, starting at the system level to safely sell and serve customers with minimal physical interaction. The hard reset every business is going through creates a strong sense of urgency to increase the agility, speed, and scale of selling, as well as customer service […]