ChaptersCircleEventsBlog
Join us for the in-person CCSK Azure course at Black Hat from August 4–5! Register now for a hands-on deep dive and secure your spot now!

Announcements

Announcements
Intrepid enterprises are bullish on quantum as a service ROI
Intrepid enterprises are bullish on quantum as a service ROI

Insider Intelligence

January 3, 2023

Catching up on threats and risks that developed over the holidays
Catching up on threats and risks that developed over the holidays

CyberWire

January 3, 2023

Predicting the Cybersecurity Future: Experts Preview 2023
Predicting the Cybersecurity Future: Experts Preview 2023

BankInfo Security

December 29, 2022

What do Helen Keller, quantum computers, world records and words of the year have in common?
What do Helen Keller, quantum computers, world records and words of the year have in common?

Fairbanks Daily News-Miner

December 27, 2022

Cloud security gaps linger through 2022 post pandemic
Cloud security gaps linger through 2022 post pandemic

SC Magazine

December 27, 2022

Adaptive Shield Releases SaaS-to-SaaS Capabilities to Minimize Supply Chain Risks
Adaptive Shield Releases SaaS-to-SaaS Capabilities to Minimize Supply Chain Risks

AIthority

December 26, 2022

Spending on the basics, not just technology is vital for cloud security: Report
Spending on the basics, not just technology is vital for cloud security: Report

IT World Canada

December 22, 2022

IBM and 70 Global Banks Co-Create New Cybersecurity, Risk Framework
IBM and 70 Global Banks Co-Create New Cybersecurity, Risk Framework

Acceleration Economy

December 20, 2022

IBM to work with nonprofit on cloud security framework for financial services
IBM to work with nonprofit on cloud security framework for financial services

SC Magazine

December 15, 2022

Three trends that steered enterprise cloud in 2022
Three trends that steered enterprise cloud in 2022

IT Brew

December 14, 2022

Wiz debuts PEACH tenant isolation framework for cloud applications
Wiz debuts PEACH tenant isolation framework for cloud applications

CSO

December 14, 2022

Cloud Migration 101: Creating an Effective Cloud Data Migration Strategy
Cloud Migration 101: Creating an Effective Cloud Data Migration Strategy

Community NassCom

December 9, 2022

KLAS: Security is a Top Factor in Public Cloud Adoption For HIT Vendors
KLAS: Security is a Top Factor in Public Cloud Adoption For HIT Vendors

HealthITSecurity

December 9, 2022

CISOs of the World, Unite!
CISOs of the World, Unite!

The Joe Sullivan Uber case may have a lasting impact on the CISO profession.

December 6, 2022

WAF is woefully insufficient in today’s container-based applications: Here’s why
WAF is woefully insufficient in today’s container-based applications: Here’s why

Security

December 2, 2022

7 Certifications for Cybersecurity Professionals in 2023
7 Certifications for Cybersecurity Professionals in 2023

CXO Today

December 2, 2022

Here are all the mistakes your business is making in cloud security
Here are all the mistakes your business is making in cloud security

Tech Monitor

November 25, 2022

Solvo Data Posture Manager protects organizations using public cloud services from data leakage and breaches
Solvo Data Posture Manager protects organizations using public cloud services from data leakage and breaches

HelpNet Security

November 22, 2022

Membership Makeover: Lessons in Evolving a Membership Model From the MPA’s Trusted Partner Network
Membership Makeover: Lessons in Evolving a Membership Model From the MPA’s Trusted Partner Network

Associations Now

November 21, 2022

How training and continuing education are crucial for healthcare cybersecurity leaders and staff
How training and continuing education are crucial for healthcare cybersecurity leaders and staff

HealthcareITNews

November 16, 2022