Safeguarding Healthcare for the Future With Zero Trust Security

In 2019, we saw a record number of information security breaches. According to the IBM X-Force Threat Intelligence Index 2020,

Read more

How a More Connected Approach Can Help With Threat Management

Threat management is a framework that is often used to evaluate and manage everything you can do to detect and

Read more

Modernizing Threat Management for the Evolving Attack Surfaces of OT, IoT and IoMT

The traditional threat landscape comprised of conventional IT assets is difficult enough to protect, detect and respond to, but the

Read more

Scalable Data Protection Is Critical to Support Data Privacy

Modern privacy regulations are founded on a variety of principles going back to 1890 that sought to protect citizens from

Read more

Increase Automation to Overcome Cyber Resilience Challenges

Security operations teams face an exponentially growing volume of security event data while resources mostly remain static. One great way

Read more

3 Trends in Data Privacy Breach Laws That Will Carry Over to 2020

During 2019, new privacy laws were introduced, and many current laws evolved in the United States and across the global

Read more

How to Create Value With Your (Security) Data Analytics Program

I have been fascinated by data analytics for all my professional life — from my early days of using Linux

Read more

Artificial Intelligence (AI) and Security: A Match Made in the SOC

Change is constant in cybersecurity — continual, rapid, dynamic change. It’s impossible to maintain an effective defensive posture without constantly

Read more

3 Steps to Find the Right Digital Transformation Strategy for You

You should not feel overly concerned if somebody says “digital transformation” and you are not exactly sure what that means.

Read more