Plato Data Intelligence.
Vertical Search & Ai.

Tag: Ponemon Institute

LightEdge Releases Next-Gen Suite of Cloud Security & Managed Services

PRESS RELEASEDES MOINES, Iowa, Feb. 15, 2024 /PRNewswire/ -- LightEdge, a leading provider of secure cloud and colocation, has unveiled the next generation of its cloud security...

Top News

Cerby Announces $17M in Series A Funding to Secure Nonstandard Applications

ALAMEDA, Calif., Aug. 22, 2023 /PRNewswire/ -- Cerby, the comprehensive access management platform for nonstandard applications, today announced that the company has raised $17 million in Series A funding....

The danger within: 5 steps you can take to combat insider threats

Business Security Some threats may be closer than you think. Are security risks that originate from your own trusted employees on your radar?...

6 Attack Surfaces You Must Protect

Greater connectivity and enhanced digital operations can deliver a number of business benefits, but they also create a broader, more dynamic environment to defend....

Breakthrough Study Reveals Executives Are Not Adequately Protected From Personal Cyber-Attacks

Only 16% of respondents say their organizations are highly confident that CEO or executives’ personal email or social media accounts are protected...

Creating strong, yet user-friendly passwords: Tips for your business password policy

When engineer Bill Burr from the U.S. National Institute of Standards and Technology (NIST) wrote in 2003 what would soon become the world’s gold...

Creating strong, yet user‑friendly passwords: Tips for your business password policy

Don’t torture people with exceedingly complex password composition rules but do blacklist commonly used passwords, plus other ways to help people help themselves...

The Third-Party Cybersecurity Problem for Financial Organizations (Terry Olaes)

Today’s financial institutions are undergoing a transformation to modernize their organizations, increasingly relying on outsourcing operational tasks to third parties to increase efficiency. Many...

The FDA’s Medical Device Cybersecurity Overhaul Has Real Teeth, Experts Say

The Food and Drug Administration (FDA) this week put into effect fresh guidance concerning the cybersecurity of medical devices — long a concerning area...

Leveraging Behavioral Analysis to Catch Living-Off-the-Land Attacks

The most advanced cyberattackers try to look like your administrators, abusing legitimate credentials, using legitimate system binaries or tools that are natively utilized in...

Why Healthcare Boards Lag Other Industries in Preparing for Cyberattacks

As leaders responsible for prioritizing their organizations' goals, board members must push the cybersecurity agenda forward. Yet new research shows healthcare boards are far...

Attackers Were on Network for 2 Years, News Corp Says

The state-sponsored attackers behind a breach that News Corp disclosed last year had actually been on its network for nearly two years already by...

87% of Container Images in Production Have Critical or High-Severity Vulnerabilities

At the recent CloudNativeSecurityCon in Seattle, 800 DevSecOps practitioners gathered to address a myriad of software supply chain security issues, including the security of...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?