
The Top 20 Cybersecurity Startups To Watch In 2021
Cybersecurity, privacy and security startups have raised $1.9 billion in three months this year, on pace to reach $7.6 billion or more in 2021, over four times more than was raised throughout 2010 ($1.7 billion), according to a Crunchbase Pro query today. 22,156 startups who either compete in or rely on cybersecurity, security and privacy […]

What Enterprises Need to Plan for In 2021 When It Comes to Endpoint Security
Bottom Line: Today’s largely-distributed enterprises need to make sure they are putting endpoint security first in 2021– which includes closely managing every stage of the device lifecycle, from deployment to decommission, and ensuring all sensitive data remains protected. There’s a looming paradox facing nearly every organization today of how they’ll secure thousands of remote endpoints […]

7 Signs It’s Time To Get Focused On Zero Trust
When an experienced hacker can gain access to a company’s accounting and financial systems in 7 minutes or less after obtaining privileged access credentials, according to Ponemon, it’s time to get focused on Zero Trust Security. 2019 is on its way to being a record year for ransomware attacks, which grew 118% in Q1 of […]

Passwords Are The Weakest Defense In A Zero Trust World
90% of security professionals have witnessed security incidents stemming from the theft of credentials, according to a recent MobileIron study conducted by IDG. 86% of CIO, CISO and Security VPs would abandon password authentication if they could. Another survey by EMA found that mobile devices secured by biometric authentication methods present the best option for […]

CIO’s Guide To Stopping Privileged Access Abuse – Part 2
Why CIOs Are Prioritizing Privileged Credential Abuse Now Enterprise security approaches based on Zero Trust continue to gain more mindshare as organizations examine their strategic priorities. CIOs and senior management teams are most focused on securing infrastructure, DevOps, cloud, containers, and Big Data projects to stop the leading cause of breaches, which is privileged access abuse. Based […]