Energy companies face rising credential-based cyber threats as IT and OT systems converge. The article explains how legacy equipment, shared accounts and operational pressures complicate strong authentication
Cybersecurity Specialist, Specops Software – An Outpost24 Company
Dr Vrizlynn Thing, SVP, Head of Cybersecurity Strategic Technology Centre at ST Engineering, shared how cyber-resilience principles can help organizations build AI that is secure, trustworthy, and robust
SVP, Head of Cybersecurity Strategic Technology Centre, ST Engineering
In this article, Stellar highlights the possible causes behind this Outlook data file error and explain the troubleshooting methods to fix it
Technical Marketer, Stellar Data Recovery
How do we strike the right balance between rapid innovation and maintaining airtight security in a SaaS-first, AI-driven landscape?
Technical Architect, Salesforce
Field CTO, Salesforce
Field CTO, Salesforce
As quantum computing advances, so is the race to secure our systems before "Q-day" when quantum machines can break today’s encryption. At GovWare 2025, Singapore’s role as a global testbed for quantum-safe innovation was highlighted, with insights from an expert at global technology, defense and engineering group ST Engineering
Editor, Infosecurity Magazine
In this article, learn how CISOs can strengthen Active Directory, enforce strong password policies and implement MFA to achieve NIS2 compliance
Cybersecurity Specialist, Specops Software – An Outpost24 Company
Learn how to make your backups fully compliant with SOC 2 Criteria and ISO 27001 Controls and pass an audit or certification
Xopero Software / Gitprotect.io
Compliance frameworks set essential cybersecurity standards, but checking boxes is not enough to prevent breaches. Continuous security requires proactive threat detection, breached password monitoring, and adaptive password policies that protect high-risk accounts. Specops Password Policy strengthens Active Directory defenses by bridging the gap between compliance, password security and real protection
Cybersecurity Specialist, Specops Software – An Outpost24 Company
The cybersecurity talent gap is now a strategic risk, threatening national security, AI safety and enterprise resilience. Tech alone can't defend, skilled humans are essential to interpret threats and enforce accountability
Cybersecurity Advisor, Program Manager
Past President of the ISACA Harare Chapter, ISACA
This article helps bridge the divide by showing how SaaS fundamentally changes Business Continuity and Disaster Recovery planning and data repair, particularly in the era of agentic AI
Technical Architect, Salesforce
Field CTO, Salesforce
Field CTO, Salesforce
Explore the impact of SAP IdM and GRC end-of-life by 2027 and discover key considerations for migrating to new identity and governance solutions
Senior Solutions Architect, One Identity
Misalignment between InfoSec and SaaS teams creates an "InfoSec↔SaaS Divide," leading to delays and risk exposure. Bridging this operational gap is vital for securing SaaS data and unlocking the future benefits of agentic AI
Technical Architect, Salesforce
Field CTO, Salesforce
Field CTO, Salesforce
Threat actors are increasingly using trusted, legitimate tools to hide malicious activity, with 84% of high-severity attacks now leveraging Living-off-the-Land techniques
VP of Threat Research, Bitdefender
Understand the phases of service desk attacks and explore how organizations can strengthen defenses to prevent social engineering from becoming a gateway to compromise
Cybersecurity Specialist, Specops Software – An Outpost24 Company
This article explains how audits strengthen cybersecurity by exposing common gaps, enabling faster remediation and enforcing stronger policies
Cybersecurity Specialist, Specops Software – An Outpost24 Company
In this guide, Stellar explores the strategies or best practices that you can follow for successful Exchange Server recovery in case of a failure
Technical Marketer, Stellar Data Recovery
Learn how DevSecOps shifts security left and right across the software lifecycle and why understanding end-of-life risks is the next frontier
Sr. Product Marketing Manager, TuxCare
Explore the hidden risks of ephemeral accounts and discover how just-in-time (JIT) privilege elevation can enhance security without compromising operational efficiency
PAM Principal Presales Engineer, North America, One Identity
As interest in cryptocurrencies grows, using a hardware wallet is emerging as the most secure way to manage digital assets compared to storing them on exchanges
This article by Passwork explores the complexities of GDPR-compliant password management, balancing security requirements, usability and the challenges posed by human behavior
Security Analyst, Passwork