exclusive content

Cutting-edge cybersecurity protects the mobile workforce

The COVID-19 pandemic created new challenges for KIPIC as employees worked remotely and increasingly relied on mobile devices. As a critical national infrastructure organisation, the petroleum products company is highly visible and a valuable target for threat actors. KIPIC needed a security capability that would self-install for mobile users and provide clear alerts, guidance and […]

6 cybersecurity tips from retired CIA tech expert

Healthcare cybersecurity is an increasingly important issue, as it can protect the health and data of patients and save health systems from expensive cyberattacks. In Forbes on May 19, retired CIA cybersecurity expert Barbara Hunt outlined six steps to keep networks secure: Read the complete article here

Hybrid work increases cybersecurity concerns for firms

69% of businesses in Ireland think hybrid working arrangements will increase the chances of a cyberattack or incident, according to a new survey by Dell Technologies. 91% of companies surveyed said they took steps to enhance data protection in the past 12 months. The latest ‘Cyber Resilience Survey’ from Dell, in partnership with the Executive […]

40% of enterprises don’t include business-critical systems in their cybersecurity monitoring

Logpoint has announced findings from a recent poll to uncover the security and cost implications enterprises face with their existing IT infrastructure. The poll was targeted at cybersecurity and IT professionals in both the U.S. and UK. The problem with monitoring of business-critical systems The poll revealed the extent of insecure and unmonitored business-critical systems, […]

Impact Of India’s Cybersecurity Directions On The Global Internet

“CERT-In’s directions, specifically the overbroad mandate for all entities to synchronize their time with the government’s servers and for them to maintain all their ICT system logs for a period of 180 days, could have serious repercussions on the usefulness of the Internet for India and its people. The CERT-In directions endanger the very sectors […]

Cybersecurity And Risk Management In The Internet Of Things

A broad and vast network of devices connected to the internet is the vision of the Internet of Things (IoT). In this vision, the IoT connects nearly every aspect of life—whether that’s cardiac rhythm monitoring in the home for greater health support, traffic management to alleviate congestion and air quality monitoring and decrease air pollution, […]

Bridging the talent gap with on-demand, skilled researchers

Diverse perspectives and creativity that outmatch the adversary When hiring a security professional, there is an excess of skills and qualifications that you might consider including in the job description. For example, in 2021, 32% of hiring managers sought out individuals with certifications, 25% sought out advanced cybersecurity skills and 65% sought out previous relevant […]

Better cyber security begins with real-time visibility

Read this e-book to learn how leading organizations use Illumio’s real-time visibility and Zero Trust segmentation to defeat ransomware and other cyberattacks. Download Better cyber security begins with real-time visibility Whitepaper

A checklist for implementing cyber protection for SMBs

When it comes to cybercrime, today’s small and midsize businesses (SMBs) are an easy target. Budgets and staffing are limited, and finding the right skilled people is difficult. Administering your IT needs and keeping your data, systems, and applications secure can be a challenge. A new approach is needed — one that efficiently integrates cybersecurity, […]

6 reasons oil and gas organizations need to implement an industrial cybersecurity program

Oil and gas companies must focus on building robust industrial cybersecurity programs to prevent and respond to the next attack. Over the course of the last year, a surge of unprecedented attacks has made industrial cybersecurity top of mind for industrial organizations around the world. This is particularly true in critical infrastructure sectors such as […]