Blog
Using replication technology to ensure cloud-based IoT security can be maintained at scale
May 21, 2020
0 Comment
By Dennis Monner
How long can today’s cloud security systems cope with the growing mass of connected devices and users, the continued expansion of the IoT, and the expectation that remote workforces will become a permanent trend? In theory, cloud security systems can scale indefinitely, but the evidence is that there comes a
By Vishal Chawla
There are millions of open cybersecurity jobs, and professionals can make a lot of money working in cybersecurity. Many companies are grappling to find enough qualified people to assist in building intelligent cybersecurity frameworks. The difficulty of adequate cybersecurity skills has become clear in the last five to ten years
By Charles Eagan
Malware, phishing and ransomware are constantly keeping security teams on their toes. But there is one risk to data security that cannot be stopped by cybersecurity software: human error. Unlike malicious threat actors, human error doesn’t come and go as trends in the cyber landscape change. It is true of data
By Eyal Benishti
Over the past decade, the financial losses associated with cyberattacks have been devastating to organizations, municipalities and small businesses. In just three years, business email compromise (BEC) has cost organizations more than $26 billion, driving a global law enforcement movement called “Operation reWired” into action that specifically focused on disrupting
By Srini Tummalapenta
While organizations around the world are rightly focused on the COVID-19 pandemic, the work of cybersecurity must continue. In fact, attackers often increase their efforts to breach networks and systems during times of trouble, counting on the chaos as a useful distraction. In such times, the best cybersecurity practices should actually