News, Insight and Analysis
News
-
RSAC Conference 2025 video reports
We chatted on camera with attendees and presenters at RSAC 2025. Check out this video collection to get highlights from one of the world's major cybersecurity conferences. Continue Reading
-
Palo Alto announces ML-enabled software update and firewalls
Palo Alto's updated PAN-OS software uses machine learning to analyze network traffic in real time, and two firewall appliances provide the processing power to support it. Continue Reading
-
Hackers upping SSL usage for encrypted attacks, communications
A report from cloud security vendor Zscaler found that cybercriminals are using secure connections to evade detection while carrying out network attacks. Continue Reading
-
Accenture sheds more light on August data breach
The IT services giant disclosed in an SEC filing that threat actors stole and leaked proprietary data during a LockBit ransomware attack earlier this year. Continue Reading
-
Google digs into Iran's APT35 hacking group
Covert phishing tactics and cleverly disguised notifications are among the calling cards of the increasingly sophisticated operation aimed at Iran's opponents. Continue Reading
Get Started
-
8 ERP security best practices for modern ERP environments
As supply chain attacks continue, ERP security requires strong authentication, regular patching, monitoring and incident response practices across cloud and on-premises systems. Continue Reading
-
Incident response: How to implement a communication plan
Communication is critical to an effective incident response plan. Here are best practices for communication planning and an editable template to help you get started. Continue Reading
-
17 real-world use cases of the metaverse, plus examples
Use cases for the still-developing metaverse are growing as the technologies that enable this next iteration of the internet mature. Here are 17 examples of enterprises and consumers. Continue Reading
-
Cybersecurity awareness quiz: Questions and answers
From phishing to patching, file sharing to MFA, find out how much you know about preventing cybersecurity incidents in this security awareness training quiz. Continue Reading
-
Sustainability and ESG glossary: 52 terms to know
Sustainable strategies require a basic understanding of the fundamentals. Business and IT leaders can benefit from this list of essential sustainability terms and ESG concepts. Continue Reading
Evaluate
-
What happens when buying outpaces procurement
From shared devices to AI copilots, decisions about access, behavior and day-to-day workflow are shaping technology outcomes well before formal buying begins. Continue Reading
-
How enterprise access decisions are starting to show up earlier
As work consolidates in browsers and quick-entry paths, access decisions are shifting to the front door of enterprise systems, often without clear ownership or centralized control. Continue Reading
-
The AI plateau: What smart CIOs will do when the hype cools
The AI plateau marks a shift from hype to practical results. CIOs who focus on governance and measurable value can navigate this period successfully. Continue Reading
-
Predictability emerging as enterprise IT's new north star
Across ERP cloud migration, desktop and compliance decision-making, enterprise IT teams are prioritizing predictability, locking in cost, control and accountability before go-live. Continue Reading
-
Enterprise cybersecurity: A strategic guide for CISOs
CISOs and others responsible for safeguarding an organization's systems, networks and data need to manage day-to-day threats while also planning strategically for what's ahead. Continue Reading
Manage
-
10 types of information security threats for IT teams
Know thine enemy -- and the common security threats that can bring an unprepared organization to its knees. Learn what these threats are and how to prevent them. Continue Reading
-
Preventing attacks on mobile applications in the enterprise
As mobile devices gain popularity as enterprise devices, mobile apps become a greater target for hackers. Understand the risks that come with mobile apps and how to mitigate them. Continue Reading
-
8 ways to enhance data center physical security
Data center physical security is just as important as cybersecurity. Organizations can follow these eight security approaches to enhance facility access monitoring. Continue Reading
-
What is a compliance audit? (with an example checklist)
A compliance audit is critical for finding any potential compliance gaps in an organization's operations. Here's what companies can do to prepare for them. Continue Reading
-
Compliance stakeholders and how to work with them
Stakeholders' involvement can strengthen an organization's compliance program. Learn best practices for engaging key stakeholders in compliance initiatives. Continue Reading
Problem Solve
-
How do cybercriminals steal credit card information?
Cybercriminals have various methods at their disposal to hack and exploit credit card information. Learn what they are, how to prevent them and what to do when hacked. Continue Reading
-
7 supply chain resilience strategies to use now
Weather events, geopolitical unrest and other disruptions are occurring more frequently. These seven supply chain resilience techniques can help manage them. Continue Reading
-
5 cybersecurity risks and challenges in supply chain
Supply chains have a range of connection points -- and vulnerabilities. Learn which vulnerabilities hackers look for first and how leaders can fend them off. Continue Reading
-
8 dangers of shadow IT and how to manage them
Unauthorized devices, software and system changes -- and other forms of shadow IT -- can expose organizations to a range of security risks. Here are ways to manage them. Continue Reading
-
How to avoid malware on Linux systems
Malware attacks are devastating to companies, and there is no exception for Linux systems. Consider updating systems and assigning correct permissions. Continue Reading