Articles

Network Security

Digital Perimeter: Security Architecture and Emerging Technologies

| Andrew Jarrett | Network Security In the current threat landscape, where cyberthreats are evolving rapidly, proactive network security is desperately needed to prevent and reduce the impact of cyber incidents. The article will shed light on the fundamentals of security architecture and its evolving role in modern cybersecurity. It will focus on the key…

Read article
Data Privacy and Protection: Strategies to Secure Sensitive Information

| Pedro Nunes| Network Security In today’s digital environment, safeguarding sensitive data—such as personally identifiable information (PII) and intellectual property—is indispensable to maintain compliance, trust, and resilience against cyberthreats. This article outlines a framework for data privacy and protection, explores strategies to secure information across digital ecosystems, and shares best practices for identifying, minimizing, and…

Read article
Risk, Compliance, and Resilience: Key to Information Security Management

Risk, Compliance, and Resilience: Key to Information Security Management The governance, risk, and compliance (GRC) framework lies at the core of an organization’s information security policies. This regulatory approach allows businesses to minimize risk to their digital infrastructure and data while operating in a digital environment teeming with information security threats. This article is based…

Read article
How CND Equips Professionals for Today’s Threat Landscape – Interview with Paul Irwin

How CND Equips Professionals for Today’s Threat Landscape – Interview with Paul Irwin With the growing number of threats to an organization’s network assets, the demand for skilled network security professionals has surged significantly. This trend underscores the critical need for comprehensive network security training, especially for IT professionals who already possess a basic understanding…

Read article
The Role of Artificial Intelligence and Machine Learning in Enhancing Cybersecurity against Cybercrime

Technological advancements in recent years have been actively accompanied by cyberattacks targeting associated vulnerabilities. Recent data suggests that cybercrime is projected to cost businesses trillions of dollars annually, with global estimates indicating an increase of 6.4 trillion USD (+69.41%) from 2024 to 2029, reaching a peak of 15.63 trillion USD by 2029 (Petrosyan, 2024a). As…

Read article
Vulnerability Management
From Drowning to Thriving: The Evolution of Vulnerability Management

The role of a CISO leading the security team in a technology company demands continuous vigilance and a proactive response to a relentless tide of security threats and incidents. With security teams continuously searching for vulnerabilities, each day of threat management resembles an incident response crisis. During these processes, it is essential for CISOs and…

Read article
GenZ IAM: Transforming Identity and Access Management with Gen-AI

In today’s digital landscape, identity and access management (IAM) and regulating access to sensitive data and resources are paramount for any organization. From a zero-trust framework to a cybersecurity mesh architecture, the identity fabric is the core and is considered the most critical element in defining your security strategy. It is and was IAM that…

Read article
XSS Attacks: Meaning, How It Works, and Prevention Methods

| David Tidmarsh  | Network Security XSS attacks are one of the most common cyberattacks, making them essential knowledge for cybersecurity experts. In this article, we’ll examine what XSS attacks are, why you should know about them, and how IT security professionals can prevent XSS attacks. What Are XSS Attacks? A cross-site scripting attack (XSS…

Read article
What Is Identity and Access Management? 

Identity and Access Management (identity access management or IAM) is vital to any cybersecurity strategy. It’s also often misunderstood. Instead of being one activity, IAM is a practice encompassing technology, business processes and policies, and organizational techniques.

Read article