hybrid goals

Cybersecurity Goals Conflict With Business Aims

A study from Forrester Consulting found most organizations face challenges aligning cybersecurity priorities with business outcomes ...
Security Boulevard
organization, zero-trust, trust supply chain third-party

Zero-Trust: 5 Steps to Transition From Hype to Reality

The paradigm shift toward zero-trust has been years in the making for some organizations, while others still regard it as an aspiration. Although many organizations have touted their success in implementing the ...
Security Boulevard
Endpoint Detection Compared

Endpoint Detection Compared

We compare endpoint security products directly using real, major threats How can you test and judge endpoint protection products? SE Labs tested a variety of Endpoint Detection and Response products against a ...
Does it matter if your company is hacked?

Does it matter if your company is hacked?

And why are some businesses overconfident that they are secure? A true story: There was a team manager, a head of IT and a chief financial officer. I asked each if they ...
How to make your phishing campaign a success

How to make your phishing campaign a success

Phishing is the most frequently deployed method used by criminals to initiate a cyber attack, according to research from IBM. Phishing is designed to trick users into clicking on links or downloading ...
cybersecurity poverty line, data-centric, SUSE cloud Wiz Torq AirTag Skyhawk SASE security cloud security visibility PwC Survey Finds C-Level Execs Now View Cybersecurity as Biggest Risk

SUSE Survey Surfaces Multiple Cloud Security Challenges

A survey of 501 IT professionals based in the U.S., United Kingdom and Germany published today found that, on average, organizations were impacted by four cloud-related security incidents in the past year ...
Security Boulevard
DIY email security

DIY email security

Can you defend against email threats better than the security companies? How well do the main email platforms handle threats? Is it worth paying for additional email security from a third-party specialist? ...
Top Five Antivirus Myths Busted

Top five antivirus myths busted

And why do we still believe them? Anti-virus, or endpoint security plays an essential part in protecting Windows PCs. Whether you are working in the world’s largest enterprise, or using a small ...
Early protection systems

Early protection systems

Can EDR really stop advanced targeted attacks? SE Labs tested Coronet Cyber Security Coro against a range of hacking attacks designed to compromise systems and penetrate target networks in the same way ...
cybersecurity password

Weak Passwords Offer Easy Access to Enterprise Networks

Poor password practices continue to put businesses at risk, with nearly 90% of passwords used in successful attacks consisting of 12 characters or less, indicating additional security measures are required to protect ...
Security Boulevard