Cyberwarfare: the New Frontier of Wars Between Countries Cyberwarfare can be launched instantly, making it difficult to counter Vinugayathri Chinnasamy Content Writer

A New Path for Data Protection Any organization that is dealing with large amounts of unstructured data should strongly consider microsharding Robert Clyde ISACA board director, and executive advisor for ShardSecure

Using Self-Service Password Reset Tools to Support Remote Workers Password resets have always been problematic for helpdesks Brien Posey Technology Author and Speaker, 18-time Microsoft MVP

Focus on Continuous Learning, Not Passing Exams Continuous learning is done by teaching humans to think for themselves and be creative Max Vetter Chief Cyber Officer , Immersive Labs

Stop the Cyber-Attack Cycle with Privileged Access Management Securing privileged access helps shrink the attack surface Lavi Lazarovitz Head of Security Research, CyberArk

Distributed Working Demands New Levels of Data Security at the Edge Lockdowns and quarantines have rapidly changed how organisations of all sizes operate Maria Sirbu VP Business Development, Voxility

Migrating On-Premises Email to Office 365: Limitations, Prerequisites and Best Practices The critical considerations for migrating an on-premises email organization to Office 365 Bharat Bhushan Technical Marketer, Stellar Data Recovery

Is it Finally the End of Adobe Flash Player? With the end of support just a few months away, is it finally the end of the road for this buggy plug-in? Adam Palmer Chief Cybersecurity Strategist , Tenable

Twitter Hack Exposes Security Holes Lessons learned form the recent Twitter breach Karen Bowen Password Security Expert, Specops Software