The challenge of securing data has seen a dramatic shift in complexity in recent years due to an increasing number of threats frequently appearing. However, this complexity will always be an addressable and scalable issue with the right solution in place. Additionally, the rapid advent of new and evolving technologies is presenting opportunities where organizations…

Among organizations that engage third parties to provide business services, 83% identified third-party risks after conducting due diligence and before recertification, according to Gartner. Gartner’s survey of more than 250 legal and compliance leaders reveals that the standard point-in-time approach to risk management is no longer effective in today’s landscape of fast-paced, rapidly changing business…

On a global scale, cybersecurity is suffering from a severe shortage of experts. What is to be done? Organizations, government, academia and professional associations need to work together to develop a sustainable cyber skills strategy. To date, strategic thinking has largely focused on what to defend and how to defend, but less on who is…

David and Goliath. The Invasion of Normandy. No matter the generation, we all know some of the storied battles that have withstood the test of time. In cyberspace, however, there’s a fierce battle brewing surrounding artificial intelligence. With AI projected to become a $190 billion industry by 2025 (according to Markets and Markets), it is…

The majority of organizations don’t know if the security tools they deploy are working, and are not confident they can avoid data breaches, according to AttackIQ. AttackIQ released the report based on Ponemon Institute research evaluating the efficacy of enterprise security strategies. Ponemon surveyed 577 IT and IT security practitioners in the United States who…

For the last 50 years, the fundamental and largely unchanged model for identifying and authenticating users has been based on the combination of a username and password, sometimes augmented with “second factor” techniques. While this approach has mostly served financial and other high-security industries well, it’s increasingly shown to suffer from five drawbacks: 1. Complex…