The average cost of a data breach hit a record high of $4.35 million, a 13% increase in the last two years, according to the 2022 Cost of a Data…
Browsing CategoryIT Security
U.S. Cybersecurity Policy Has Changed Since the Colonial Pipeline Attack
More than a year ago, a ransomware attack made the news across the nation. The Colonial Pipeline Company announced on May 7, 2021, that the DarkSide Ransomware-as-a-Service group, based in…
Non-Traditional Cybersecurity Career Paths – One Experience Informs Another
In a previous article, I shared the stories of how more than a dozen cybersecurity professionals found their way into the industry. Their non-traditional cybersecurity career paths help to illustrate…
Firewall Services and More: What’s Next for IT?
Firewall services, cloud network protection tools and other IT defense staples are seeing a lot of changes in 2021. IT landscapes are growing more complex, as are the defense systems…
IBM CISO Perspective: Zero Trust Changes Security From Something You Do to Something You Have
As the chief information security officer (CISO) for IBM, I’m often asked by peers and colleagues, “What do you think of Zero Trust?” Or, perhaps more often, “What strategies are…
Your Newest Cybersecurity Professional Is Already in Your Company
The cybersecurity talent gap is real. The 2019/2020 Official Annual Cybersecurity Jobs Report predicts that there will be 3.5 million security jobs left unfilled globally by 2021. The cybersecurity profession…
It’s Time to Take a Fresh Look at Zero Trust
With millions of employees across the U.S. experimenting with work-at-home scenarios for the first time, many organizations are taking a fresh look at a Zero Trust security strategy. A convergence…
How Torii Helps IT Managers Stay on Top of Cybersecurity
Lack of proper SaaS management in your IT department can expose your organization to a number of potential security loopholes and endpoint threats. It becomes difficult for IT departments to…
How Cybersecurity Salaries Fit Experience and Specialization
Not too long ago, there was a one-size-fits-all assumption about cybersecurity jobs. The security professional was hired to manage security systems and read logs — maybe handle audits and ensure…
Most Important Security Consideration to Strengthen Enterprise IT Security Against Cyber Attack
Cyberattacks are always evolving and hackers are always one step ahead of enterprises. Ransomware, DDoS, Man-in-the-middle, Phishing and more, their hacking methodologies always seems to evolve, especially the recent cryptojacking…