<
>

Lessons to Learn From Real-World Data Breaches

Cybersecurity breaches are becoming a serious concern for organisations. According to a study by IBM Security, the cost of a data breach has risen by 12% over the last five years. Today, the average data breach costs...

Why Is Visibility Crucial for Cloud Security?

Cloud services continue to be the main agenda for businesses in their digital transformation journey. As more businesses continue to use the cloud, be it for storage, backup or processing workloads, the risks for businesses are...

Implementing an Extra Level of Security for Emails

Emails are important in any organisation. Be it for communicating or marketing, almost all employees are assigned to a company email the moment they join an organisation. While larger enterprises would often have their own...

Why Shadow IT Is a Major Target for Cyber Attacks

As business users using IT become increasingly used to running apps in their personal lives, the growth of “Shadow IT” has darkened corporate IT departments. Shadow IT is a term that is used to describe unsanctioned...

Filling the Security Gaps In Your Multi-Cloud

For the majority of companies today, their journey to cloud has become a vital component of digital business transformation. However, being dependent on just one cloud provider for all of your IT requirements no longer makes good...

Five Multi-Cloud Security Threats For Which You Must Be Prepared

Moving all your data onto the cloud is the best way of ensuring you’re meeting your digital transformation needs. But at the same time, you will want to be sure that your data is safe and secure. While the on-premises...

Biggest Data Breaches of 2019: Some of the Worst of the Worst

CSA Editor’s Comment: We would like to share this blog post contribution from Taylor Armerding, Software Security Expert at Synopsys Software Integrity Group, which we think will really interest our readers. In this post,...

Businesses need to understand the mind of a cyber criminal

Cyber threat actors, be it state-sponsored, organised hacker groups, hacktivists or lone wolf individuals pose a threat to organisations worldwide. Understanding the mind of cybercriminals is essential so that your organisation...

Choosing the Right Endpoint Security Solution

With the growing number of connected devices and workplace mobility becoming a common practice in most organisations, businesses need to ensure their devices are always secure. Unsecured endpoint devices, be it mobile phones,...

Is Upgrading Your Endpoint Security Software Necessary?

There’s a slew of growing problems that modern businesses are facing – cybercrime is on the rise, targeted attacks and data breaches are becoming more common (and not to mention costly), and they also have the...