Featured articles
In
Company
Five steps to navigating Clop-dominated risks in Healthcare
In cybersecurity, the Healthcare and Public Health (HPH) sector faces an ever-evolving array of threats. The notorious Clop ransomware group has...
The Hidden Cybersecurity Threat in Organizations: Nonfederated Applications
Unearthing the truth behind nonfederated applications through independent research.
From FUD to Framework: unpacking CISA's Zero Trust Maturity Model
Zero Trust is a journey and is not something you can buy from a vendor.
In
Security
Why enforcement based security controls don’t always work
An enforcement-based approach to security
In
Company
Introducing Cerby's 2023 State of Employee Trust report
Cerby's research shows that employee application choice is intimately tied to how people get their work done and their job satisfaction levels.
In
Industry insights
Social Media Security and Elections
Social media impact on the U.S. politics
In
Security
Unmanageable Applications defined, explained, and explored
What are unmanageable applications? Unmanageable applications are a class of applications defined by their lack of support for common identity and...