I’ve very reluctantly started allowing some of my employees to use laptops because they travel enough to justify it, but I’m worried about security especially when it comes to our sensitive company ...
The security of personal health data is increasingly equated with individuals’ more conventional protected information, such as financial and identifying information. Regardless of the type of data an ...
The tension between data hunger and data hazards may be the defining challenge of the modern enterprise. The volume of data collected and stored by enterprises has exploded in the past few years. This ...
In today’s data-focused world, modern organizations rely on data not only to conduct business but to plan their future. Data is the fuel for AI and machine learning techniques that drive ...
To safeguard enterprise data in hybrid cloud environments, organizations need to apply basic data security techniques such as encryption, data-loss prevention (DLP), secure web gateways (SWGs), and ...
Blockchain is emerging as a powerful tool for CISOs to close trust gaps in identity, audit and supply chain security.
In 2025, data centers face a rapidly evolving security landscape, driven by technological advancements like artificial intelligence, cloud integration, the Internet of Things, and a rise in ...
Biometric authentication—using fingerprints, facial recognition or even iris recognition—has become an integral part of our society and digital security. I'm asked questions about about this topic ...
Collects and uses customer or employee personal information. Participates in an industry sector that is considered high risk or critical infrastructure. Offers securities as a publicly traded company.
We’re looking at startups founded in the past four years that have recently launched new offerings for cloud, data or identity security. As threat actors continue to move away from targeting endpoints ...
The browser is becoming the operating system for modern work, yet many enterprises still treat it as an extension of network or endpoint security. Keep Aware's 2026 State of Browser Security Report ...
We've been reactive toward security risks for years, waiting for an incident to occur before responding. But what if I told you that a proactive approach, identifying and mitigating security risks ...