Open source developer tools have won: That’s a supply chain risk
Maintainers of open source developer tools will need to work doubly hard to ensure that they maintain software supply security.
View ArticleCharles Henderson hired as EVP of Cyber Security at Coalfire
Charles Henderson was hired as EVP of Cyber Security at Coalfire with experience in threat intelligence, incident response and penetration testing.
View ArticleProposed rules may lead to increased compliance requirements ahead
Proposed due diligence requirements for U.S. infrastructure as a service providers may lead to increased compliance expectations.
View Article3 tips to help bridge the gap between identity and security teams
Everyone knows identity has become a business-critical service. But now, identity has come to the forefront of both IT and security conversations.
View ArticleThe future of data privacy and compliance (and how to stop it)
Organizations face ever-increasing pressure to adapt to new realities.
View ArticleNavigating the identity security landscape
Jeff Reich, Executive Director of the Identity Defined Security Alliance, discusses the challenges security professionals face in the evolving landscape of identity security threats.
View ArticleBreaking down DE&I barriers: Practical tips for security leaders
It has never been more critical to double down on diversity in tech to increase innovation and business success through varied strengths and experiences.
View Article5 crucial cybersecurity resolutions to embrace this World Backup Day
World Backup Day could be the day to institute some resolutions to help plug the gaps and prepare for a world of rising cybercrime and inevitable errors.
View ArticleHow to fix the growing cybersecurity skills gap
Cyber and ransomware threats are growing at a rapid rate, critically endangering organizations’ sensitive data.
View Article4 practices CISOs should prioritize in their mobile security strategy
The mobile threat is twofold: you must secure your enterprise's mobile apps and mobile devices accessing the enterprise.
View ArticleTalent shortage is leading to automation and outsourcing
A new report discusses trends in automation and outsourcing within IT teams.
View ArticleAdapting to the latest SEC disclosures
Threats such as cyberattacks, supply chain attacks, network intrusions, and ransomware are now an everyday occurrence, causing significant damage.
View ArticleProactive security: Identify the precursors of violence
Proactive security strategies to help detect and prevent workplace violence.
View ArticleInsider risk: Don't ignore the community context
Managing insider risk means also managing the environmental factors that may cause them.
View ArticleRecognizing the hidden costs of a security program
Security leaders must be fully aware of the true impact security has on an organization’s bottom line if they want to succeed.
View ArticleThe evolution of the corporate security mission
Embedding security into a company's culture helps maintain a competitive advantage.
View ArticleCredential phishing accounted for 91% of active threat reports
Email accounts become a frequent attack victim for threat actors.
View ArticleReal-time data and AI are the new weapons against climate disasters
As climate change intensifies extreme weather, the need for intelligent emergency systems becomes even more critical.
View ArticleBe ready to quickly find a security job
Steps to help ensure a solid backup plan is in place for when security practitioners need to find a new security job quickly.
View ArticleKristine Raad joins General Motors as Chief Security Officer
Kristine Raad has announced a new position as a Chief Security Officer at General Motors.
View ArticleWhen solution providers host industry conferences
How to choose which security conferences to attend, exhibit at, or present at depends on many different factors.
View ArticleMentorship key in building security careers
Security leaders share the impact mentorship has had on furthering their careers in the industry.
View ArticleReport finds that only 5% of businesses have a cyber expert
Although cybersecurity is vital to an organization’s financial success, many companies do not have a designated cyber expert.
View ArticleStay a step ahead with the missing link in cybercrime defense: OSINT
Adding OSINT-driven threat intelligence to the CISO toolkit can be a game-changer, enabling a proactive approach to cybercrime defenses.
View ArticleBuilding cyber resilience through cyber tabletop exercises
Organizations can use cyber tabletop exercises as a powerful tool to build robust and adaptable cyber defenses.
View ArticleIs your financial data safe this tax season?
Explore strategies for individuals, as well as tax preparation organizations, to ensure their data and their clients’ data is protected this tax season.
View ArticleNavigating cybersecurity in telecommunications: The FCC's 7-day rule
Under heightened national and economic security scrutiny, telecom operators must rise to the challenge.
View ArticleAI security for CISOs: A dynamic and practical framework
Without the proper foundation or understanding of how to secure their AI systems and address key security concerns, innovation slows or gets stuck.
View ArticleAre AI data poisoning attacks the new software supply chain attack?
With rapid AI adoption happening across varying business units, maintaining the integrity of those systems is a growing concern.
View ArticleThe cat and mouse ransomware game may threaten smaller organizations
It is possible that cybercriminals will shift from a few large-scale, high-stake ransomware attacks to a broader array of smaller-scale attacks.
View Article
More Pages to Explore .....