Why the convergence of ZTNA, mobile devices and identity management deserves your attention
Augusto Morales is a Technology Lead (Threat Solutions) at Check Point Software Technologies. He is based in Dallas, Texas, and…
Augusto Morales is a Technology Lead (Threat Solutions) at Check Point Software Technologies. He is based in Dallas, Texas, and…
The University of Michigan recently announced a data breach that took place in August. Cyber attackers broke into the university’s…
By Blair Cohen, Founder and President, AuthenticID Not only has digital transformation completely reshaped the way we conduct business, but…
Cybersecurity Awareness Month is upon us. In our efforts to address all of the questions a business owner reviewing our…
By Jason M. Schwent, Senior Counsel, Clark Hill The enactment of the California Online Privacy Protection Act of 2003 created…
Welcome to a new series of weekly blog posts rounding up the biggest and most interesting news stories. At the…
Summary: With dozens of apps, systems and devices to keep up to date, many IT departments suffer from ‘patching paralysis’.…
When it comes to managing security vulnerabilities, it helps to know your enemy. That’s why businesses rely on a set…
Secure remote working tips and VPN insights from our senior penetration tester Leon Teale is a senior penetration tester at…
EXECUTIVE SUMMARY: As we near the final stretch of Cyber Security Awareness Month, it’s time to expand our focus beyond…