Home Cybersecurity

Cybersecurity

Avoiding Cybersecurity Staff Burnout: Keeping Employees Productive and Engaged

Cloud security professionals are already in short supply. Combine that with alert fatigue, a surge in demand, and the "always-on" nature of the modern...

Tech Predictions for 2022: Cloud, Data, Cybersecurity, AI, and More

You might think it foolhardy to make predictions about something that changes as furiously fast as emerging technology. Driven by massive investments, competing for...

5 Edge Computing Trends in 2022

Edge computing trends play a key role in business because edge deployments are now essentially everywhere. With the list of edge computing devices growing...

5 Ways Social Media Impacts Cybersecurity

Social media is appealing because humans are inherently social creatures. We like to connect, share and discuss. But it’s clear that sometimes, these impulses...

Palo Alto Firewall Boosts Performance with Single Pass Architecture

The new Palo Alto Networks PA-400 ML Powered Next Generation Firewall (NGFW) product family comes in a compact form factor and is designed for...

Satori’s Ben Herzberg and Yoav Cohen on Securing Your Snowflake Data Cloud

I spoke with Satori executives Ben Herzberg and Yoav Cohen about the key points in their new book, “Snowflake Security: Securing Your Snowflake Data...

eWEEK TweetChat, Dec. 14: Predictions for Tech in 2022

On Tuesday, December 14, at 11 AM PT, @eWEEKNews will host its monthly #eWEEKChat. The topic will be “Predictions for Tech in 2022,” and...

Experian’s Donna DePasquale on Using Tech to Modernize Financial Services

I spoke with Donna DePasquale, Executive VP of Global Decisioning at Experian, about how the use of data analytics has evolved in the financial...

Your Company’s Security: Key Points to Consider

The security you implement for your organization can make or break the success of your company. It’s always best to get it right the...

Solving Your Hardware Security Challenges, Part 2

In Part 1 of this article, we explored five key factors that make security assurance of hardware technologies a challenge. This included the disruptive...