Posts

Showing posts from February 25, 2022

As ecosystems get distributed, cybersecurity leadership will need to transform, Gartner says

Far from only being an IT concern anymore, risk-altering cybersecurity decisions are now being made by people all over a company. Staying safe means security leadership positions need to change.  The post As ecosystems get distributed, cybersecurity leadership will need to transform, Gartner says appeared first on TechRepublic . from TechRepublic https://ift.tt/Es0SbF9

How Russia’s invasion of Ukraine will affect your cybersecurity

The conflict we all feared is expected to bring an increase of cyberattacks, but experts agree that all hope isn’t lost. The post How Russia’s invasion of Ukraine will affect your cybersecurity appeared first on TechRepublic . from TechRepublic https://ift.tt/tdWhZGB

Top 5 tips for managing software incidents

You’re going to have bugs in your software. Tom Merritt explains how to manage when you find them to prevent them from being a recurring problem. The post Top 5 tips for managing software incidents appeared first on TechRepublic . from TechRepublic https://ift.tt/vFK5Gpj

Top 5 things to know about consent phishing

Just when you thought you knew what phishing perils to watch out for, along comes a new spin: consent phishing. Here’s a look at this latest cybersecurity threat. The post Top 5 things to know about consent phishing appeared first on TechRepublic . from TechRepublic https://ift.tt/nM617FB

Top 5 things to know about usage-based pricing

Usage-based pricing or metered service is on the rise in software. Tom Merritt tells us five things you should know about this type of pricing plan. The post Top 5 things to know about usage-based pricing appeared first on TechRepublic . from TechRepublic https://ift.tt/c3BHuJK