Whenever I read about a data breach, I immediately smell a cybersecurity process failure. In cybersecurity, we sure love our processes. We have them for firewalls, intrusion detection systems, IP scans, pen testing, zero trust architecture, and double secret two factor authentication probation, but I’m going to dive into the most exciting process we […]
On Aug. 25, President Joe Biden met with private-sector tech giants, such as Google and Apple, and education leaders to discuss the whole-of-nation effort and workforce training needed to address cybersecurity threats. Some of the technology companies pledged billions of dollars to support cybersecurity initiatives.
As enterprises respond to the acceleration of remote working, hybrid cloud adoption continues to increase—but security remains a persistent blocker. Marcella Arthur, Vice President of Global Marketing at Unbound Security, looks at how emerging approaches to key management are enabling enterprises to rethink and assert control over their cloud strategies.