
The Top 20 Cybersecurity Startups To Watch In 2021
Cybersecurity, privacy and security startups have raised $1.9 billion in three months this year, on pace to reach $7.6 billion or more in 2021, over four times more than was raised throughout 2010 ($1.7 billion), according to a Crunchbase Pro query today. 22,156 startups who either compete in or rely on cybersecurity, security and privacy […]

What Enterprises Need to Plan for In 2021 When It Comes to Endpoint Security
Bottom Line: Today’s largely-distributed enterprises need to make sure they are putting endpoint security first in 2021– which includes closely managing every stage of the device lifecycle, from deployment to decommission, and ensuring all sensitive data remains protected. There’s a looming paradox facing nearly every organization today of how they’ll secure thousands of remote endpoints […]

The Pandemic Is Teaching Enterprises How To Mind The Cybersecurity Gap
30% of US and UK remote workers say their organizations don’t require them to use a secure access tool, including VPN, to log into corporate databases and systems, according to Ivanti’s 2021 Secure Consumer Cyber Report. Plus, 25% of remote workers in the US and UK aren’t required to have specific security software running on […]

10 Ways Cybersecurity Can Protect COVID-19 Vaccine Supply Chains
The Pharma industry has lost $14 billion through Intellectual Property (IP) cyber theft worldwide much of it focused on vaccine development, according to the United Kingdom Office of Cyber Security and Information Assurance. 53% of pharmaceutical IP thefts and related breaches are carried out by someone with insider access also according to the United Kingdom […]

Securing Machine Identities Needs To Be A Top Cybersecurity Goal In 2021
Bottom Line: Bad actors quickly capitalize on the wide gaps in machine identity security, creating one of the most breachable threat surfaces today. Why Machines Are the Most Challenging Threat Surface To Protect Forrester’s recent webinar on the topic, How To Secure And Govern Non-Human Identities, estimates that machine identities (including bots, robots and IoT) are growing […]

Dissecting The SolarWinds Hack For Greater Insights With A Cybersecurity Evangelist
Bottom Line: Cyberattacks enter a new era of lethal impact when threat actors are sophisticated enough to compromise SolarWind’s software supply chain with infected binary code while mimicking legitimate protocol traffic to avoid detection. To gain greater insights into the SolarWinds breach, its implications on cybersecurity strategy in the future and what steps enterprises need […]

5 Ways Machine Learning Can Thwart Phishing Attacks
Global mobile phishing attempts surged by 37% amid shift to work-from-home for the thousands of businesses needing to adhere to shelter-in-place directives. According to Verizon, over 90% of breaches start with a phishing attack and with more than 60% of emails being read on mobile, mobile phishing is one of the fastest-growing threat categories in […]

Why Security Needs To Be Integral To DevOps
Bottom Line: DevOps and security teams need to leave one-time gating inspections in the past and pursue a more collaborative real-time framework to achieve their shared compliance, security and time-to-market goals. Shorter product lifecycles the need to out-innovate competitors and exceed customer expectations with each new release are a few of the many reasons why […]

5 Mistakes That Threaten Infrastructure Cybersecurity And Resilience
Bottom line: With many IT budgets under scrutiny, cybersecurity teams are expected to do more with less, prioritizing spending that delivers the greatest ROI while avoiding the top five mistakes that threaten their infrastructures. In a rush to reduce budgets and spending, cybersecurity teams and the CISOs that lead them need to avoid the mistakes […]

How To Build A Business Case For Endpoint Security
Bottom Line: Endpoint security business cases do much more than just quantify costs and benefits; they uncover gaps in endpoint and cyber protection that need urgent attention to avert a breach. Bad actors and hackers prefer to attack threat surfaces that are isolated, vulnerable with out-of-date security patches, yet integrated into a corporate network to […]