Cybersecurity

Person choosing document in folder

Netskope’s Colin Estep on managing cybersecurity risks amid “Great Resignation” [Q&A]

"Departing employees are not the only ones posing a risk. Virtually any employee can exfiltrate #data, whether inadvertently or on purpose. It would be a mistake for organizations to focus their attention on specific cohorts of employees, ignoring the broader risk of easy data exfiltration over ubiquitous cloud-based services. Our research showed most of…

Hand Holding a USB Flash Drive

As Web2 giants enter the Web3 space, security will be make-or-break

It is not a question of if, but when and how mass adoption of blockchain technologies will take place. Asset security will be vital to driving wide-scale adoption with confidence.

Understanding how MFA works for you, and how it doesn’t

Ultimately, there are pros and cons to every security measure, and we are in a constant trade-off between good cybersecurity and ease of use.

The fallout from the Colonial Pipeline ransomware attack and its implications

Digital transformation expands an organization’s attack surface, making it easier for threat actors to enter the network and gain control of OT assets. Without the correct security tools in place organizations can’t identify vulnerabilities or detect malicious activity.