ChaptersCircleEventsBlog
Join us for the in-person CCSK Azure course at Black Hat from August 4–5! Register now for a hands-on deep dive and secure your spot now!

Announcements

Announcements
CISO Perspectives and Progress in Deploying Zero Trust
CISO Perspectives and Progress in Deploying Zero Trust

 Some of the areas covered in this survey include where Zero Trust falls as a priority in the organization, t...

June 6, 2022

Three-quarters of IT pros plan to spend more on zero trust over the next year
Three-quarters of IT pros plan to spend more on zero trust over the next year

SC Magazine

June 6, 2022

Cybersecurity: Zero Trust the name of game
Cybersecurity: Zero Trust the name of game

Financial Express

June 2, 2022

Organizational Cloud Policy and Risk Review
Organizational Cloud Policy and Risk Review

In the rush towards cloud adoption and all the benefits it offers, it can be easy to overlook the basics of cloud ...

June 1, 2022

Top Threats to Cloud Computing Brings to Light New Areas of Focus
Top Threats to Cloud Computing Brings to Light New Areas of Focus

Cloud computing, as well as the security that surrounds its implementation, is an ever increasingly difficult area...

June 1, 2022

‘One of the key issues is a lack of experience’: Security teams struggle amid shift to cloud
‘One of the key issues is a lack of experience’: Security teams struggle amid shift to cloud

SC Magazine

May 26, 2022

Taking The Next Step In Digital Transformation: Modernizing Cybersecurity
Taking The Next Step In Digital Transformation: Modernizing Cybersecurity

Forbes

May 23, 2022

Cloud Security Alliance Provides C-level Executives With Best Practices for Deploying Smart Contracts Within an Organization
Cloud Security Alliance Provides C-level Executives With Best Practices for Deploying Smart Contracts Within an Organization

IT Security News

May 20, 2022

How To Plan A Pain-Free Cloud Migration
How To Plan A Pain-Free Cloud Migration

Forbes

May 18, 2022

Best practices for healthcare delivery organizations to manage supply chain cybersecurity risks
Best practices for healthcare delivery organizations to manage supply chain cybersecurity risks

Help Net Security

May 17, 2022

Balancing risk management with scalable costs is 'table stakes' for security strategy
Balancing risk management with scalable costs is 'table stakes' for security strategy

Healthcare IT News

May 17, 2022

CSA Provides Best Practices For Healthcare Supply Chain Cybersecurity - Health IT Security
CSA Provides Best Practices For Healthcare Supply Chain Cybersecurity - Health IT Security

Health IT Security

May 16, 2022

How healthcare orgs can protect their supply chain from cyber risks
How healthcare orgs can protect their supply chain from cyber risks

Healthcare IT News

May 16, 2022

What Is The Role Of AI And ML In Data Management?
What Is The Role Of AI And ML In Data Management?

Forbes

May 13, 2022

How to build a cloud security strategy that sells
How to build a cloud security strategy that sells

Venture Beat

May 13, 2022

Alliance targets healthcare supply chain cybersecurity risk management in new guide
Alliance targets healthcare supply chain cybersecurity risk management in new guide

SC Magazine

May 12, 2022

C-Level Guidance to Securing Serverless Architectures
C-Level Guidance to Securing Serverless Architectures

Serverless platforms are gaining adoption with developers as they provide a more effective way to move to cloud-na...

May 12, 2022

How Zero Trust Models Work in Container Security
How Zero Trust Models Work in Container Security

The New Stack

May 11, 2022

CEO Intersection - April 2022
CEO Intersection - April 2022

The Motion Pictures Association announces initiative to expand its content security program to address cloud more ...

May 11, 2022

Cyber Security Today, Week in Review for Friday, May 6, 2022
Cyber Security Today, Week in Review for Friday, May 6, 2022

IT World Canada

May 6, 2022