Network SecurityFive ways to beef up network security and reduce data theftDavid BalabanSeptember 27, 2024These five best practices are the blocking and tackling of network data security that never go out of style.
DevSecOpsSeven ways to secure open-source softwareDavid BalabanSeptember 17, 2024Securing open-source software will take collaboration, innovation and a commitment to best practices.
AI/MLFive ways to secure modern, AI-based customer support toolsDavid BalabanAugust 16, 2024Here’s how to modernize and service customers better, but keep the enterprise secure.
PhishingThree ways to mitigate digital impersonation attacksDavid BalabanJuly 23, 2024Digital impersonation attacks are at the center of much of the financial fraud caused by hackers, including phishing and malware distribution.
Security Strategy, Plan, BudgetNine ways construction companies can modernize and mitigate cyber risksDavid BalabanJune 26, 2024The construction industry has been ripe for IT modernization for decades – the companies that don’t modernize won’t be around by 2030.
Critical Infrastructure SecurityTen ways to minimize software supply chain risksDavid BalabanMay 17, 2024Organizations must make software supply chain security a collaborative effort where everyone on the development team gets involved.
PhishingSix ways to fend off spam in corporate networksDavid BalabanApril 18, 2024There’s no easy way to ward off spam – organizations need a mix of advanced email filtering, security protocols, modern data security tools, and user education.
AI benefits/risksHere’s how AI can enhance cybersecurity in healthcareDavid BalabanJanuary 26, 2024Four ways AI promises to revolutionize cybersecurity in the healthcare sector.
Application securityHere’s how to bridge the mobile app security gapDavid BalabanJanuary 4, 2024Follow these seven steps to more effectively manage mobile security.
IAM TechnologiesFive IAM features that can make or break the businessDavid BalabanNovember 28, 2023Here are five IAM features that will help security teams deliver both security and user convenience.