11 lies CIOs will tell themselves in 2022

11 lies CIOs will tell themselves in 2022

A key member of your leadership team isn’t giving you straight information. Which is distressing, because straight, unvarnished, accurate perspectives are what you need most when formulating IT’s strategies and plans. Sadly, you can’t escape the worst deceiver on your team. That’s because the worst deceiver is the one you see when you look in a mirror. You know who I’m talking about. It’s the person you’re most likely to trust – who’s most likely…

Read More

The top stories of 2021

The top stories of 2021

The top stories of 2021 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing…

Read More

Security budgets may double or triple in 2022

Security budgets may double or triple in 2022

Security budgets may double or triple in 2022 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Cybercriminals are closing in on supply chains

Cybercriminals are closing in on supply chains

Cybercriminals are closing in on supply chains | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

How to choose the right access control system

How to choose the right access control system

How to choose the right access control system | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Cybersecurity: When Stress and Trauma ‘Get in the Way’

Cybersecurity: When Stress and Trauma ‘Get in the Way’

This blog contains a discussion about stress, trauma, and domestic violence. This may be difficult for some readers, and given the alarming figures around Post-Traumatic Stress Disorder (PTSD), trauma, and early life experiences (ACEs), this will likely concern at least a small population of readers. Please take care of yourself when reading this and break off from reading if you feel the need to. If you do not suffer from PTSD, the following information can…

Read More

The 10 worst tech stories of 2021

The 10 worst tech stories of 2021

Have fond memories of 2021? They probably don’t include these 10 stories or the products and services surrounding them. Image: Wetzkaz Graphics/Shutterstock A lot of stuff has happened in the past year, especially in the tech world. It seemed like every time you turned your head in 2021 there was a new digital disaster unfolding: Sensitive data was leaked, ransoms took networks offline and plain old fashion gender discrimination cases have all rocked the tech…

Read More

Enterprises Cannot Achieve Zero Trust Security Without Machine Identity Management

Enterprises Cannot Achieve Zero Trust Security Without Machine Identity Management

Thanks to the rise of machines and shift towards zero-trust security, organizations’ security will require a new type of identity management By Murali Palanisamy, chief solutions officer, AppViewX   The enterprise IT landscape is experiencing phenomenal disruption. While digital transformation, cloud migration, and the remote work model have opened a world of possibilities for organizations, these sweeping changes permanently reset the cybersecurity game’s rules. The attack surface is expanding and trying to respond to these…

Read More

Safety and hygiene protocols secure tourism in Malaysia

Safety and hygiene protocols secure tourism in Malaysia

Safety and hygiene protocols secure tourism in Malaysia | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More
1 3,378 3,379 3,380 3,381 3,382 4,366