Non-Human Identities Gain Momentum, Requires Both Management, Security
The number of Non-Human Identities (NHIs) in many organizations has exploded. Key trends, drivers, and market landscape in this fast-developing…
Securing the OT Stage: NIS2, CRA, and IEC62443 Take Center Spotlight
In the dynamic landscape of Operational Technology (OT), robust cybersecurity measures are paramount. As the digital transformation accelerates, protecting critical…
The Urgent Need for Data Minimization Standards
A central principle in many data protection laws around the globe is data minimization. But we are currently facing a…
The biggest Supreme Court decisions of 2024: From presidential immunity to overturning the Chevron doctrine
The top decisions by the Supreme Court of 2024 covered presidential immunity for President-elect Trump, transgender protections, Chevron doctrine and…
How to Protect Your Environment From the NTLM Vulnerability
This Tech Tip outlines what enterprise defenders need to do to protect their enterprise environment from the new NTLM vulnerability.
Ditch The Cloud Security Labels to Nail Detection and Response
Today’s cloud security categories don’t do practitioners any favors when it comes to identifying the key requirements for detection and…
Managing Threats When Most of the Security Team Is Out of the Office
During holidays and slow weeks, teams thin out and attackers move in. Here are strategies to bridge gaps, stay vigilant, and…
Ascension: Health data of 5.6 million stolen in ransomware attack
Ascension, one of the largest private U.S. healthcare systems, is notifying nearly 5.6 million patients and employees that their personal…
Trump’s commonsense approach is the gift America needed
In a memorable scene from 1992’s “Home Alone 2,” Donald Trump guides a lost Kevin McCallister to the lobby of…