As digital transformation overtook the enterprise in 2016, security professionals have struggled to keep up with a shifting technology and cultural landscape while keeping one eye ahead on the threat horizon.
Traditional antivirus (AV) solutions no longer stop advanced attacks. Modern attackers can easily get their hands on the static and highly predictable prevention models used by legacy AV vendors, which means they can reliably find
Ajay Arora, CEO & Co-founder of data security startup Vera, shares insight on navigating the New York's newest set of cybersecurity regulations to help firms adopt a security strategy that scales in the face of future cybersecurity...
Regardless of an organization's security maturity model, when the growing level of sophisticated attackers and threats collide with the ever evolving and expanding network environment, a multifaceted defense approach is no longer a
The recent widespread DDoS attack is making CEOs nervous. As the CIO, you need to be able to address, what happened and why, and provide recommendations on what needs to be done to protect company data.
The term "next-gen" is commonly cited by technology vendors to position a product as being innovative based on new and differentiated capabilities. Notable next-gen cybersecurity products include next-gen firewalls, the state of the
Democratic presidential nominee Hillary Clinton said that, if elected, she would try to curb terrorists from using the Internet as a recruiting tool. But her statement raises questions over what can be done to prevent terrorists from...