What We Are Reading
Article

A house of divided brands: Uncovering SASE and SSE

The underlying technologies behind SASE and SSE must be made to work together if they are to secure the enterprise                                    

Article

6 Best Password Recovery Software for 2023

Looking for a trustworthy password recovery tool? Use our guide to review our editorial picks and compare pricing, features, pros and cons.           

Article

Why Isn’t Mobile at the Center of Your Cybersecurity Strategy?

This is the first article in a guest blog series by Jason Bloomberg, Managing Partner, Intellyx Focusing on user authentication, including multi-factor authentication, is not enough to put mobile at the center of your cybersecurity strategy.

Article

New healthcare cyber guidance unveiled by CISA

Aside from providing context to vulnerability trends based on CISA's Known Exploited Vulnerabilities catalog and MITRE ATT&CK framework, the guide also includes recommendations for asset management and security and identity management. Such guidance has ...

Article

5 Generative AI Predictions And A Wishlist From AWS re:Invent 2023

MORE FROM FORBESHow Google Cloud Is Leveraging Generative AI To Outsmart CompetitionBy Janakiram MSV I expect AWS to unveil a comprehensive AI assistant strategy at re ... be integrated with external data and software. Consider a chatbot in the AWS Console ...

Article

Kaspersky’s Advanced Persistent Threats Predictions for 2024

New botnets, more AI in spearphishing and increases in hack-for-hire business are some of the predictions. Get APT mitigation tips, too.              

Article

Cloud identity security success: 3 critical factors

CyberArk’s cloud security experts share key factors that can make or break a cloud identity security strategy.