Apple has been slowly creeping into the password manager space with its functionality; will it grab a big share of the mobile multifactor authentication market next? CIO David Chou takes a look at this rapidly changing area.
After being caught off-guard by security issues that were exposed during the Covid-19 pandemic, CISOs are rethinking their disaster recovery and business continuity plans, according to Shefali Mookencherry, Brian Cayer and Jonathan Langer.
What are the key differences between endpoint detection, extended detection and managed detection response solutions, and how can IT leaders make the best possible selection based on their organization’s needs? David Chou provides a “quick guide” on what CIOs, CTOs and CISOs need to know.
With attacks becoming more widespread and damaging, it no longer falls on a single department – or health system – to manage it alone, according to our cybersecurity experts. “You need a lot of friends to get this done.”
With phishing attacks becoming increasingly sophisticated, the smart approach is to focus not on prevention, but on identifying the most likely targets, putting controls in place, and offering continuous education, according to our cybersecurity experts.