Quantcast
Channel: Security Leadership and Management

Open source developer tools have won: That’s a supply chain risk

Maintainers of open source developer tools will need to work doubly hard to ensure that they maintain software supply security. 

View Article



Charles Henderson hired as EVP of Cyber Security at Coalfire

Charles Henderson was hired as EVP of Cyber Security at Coalfire with experience in threat intelligence, incident response and penetration testing.

View Article

Proposed rules may lead to increased compliance requirements ahead

Proposed due diligence requirements for U.S. infrastructure as a service providers may lead to increased compliance expectations.

View Article

3 tips to help bridge the gap between identity and security teams

Everyone knows identity has become a business-critical service. But now, identity has come to the forefront of both IT and security conversations.

View Article

The future of data privacy and compliance (and how to stop it)

Organizations face ever-increasing pressure to adapt to new realities. 

View Article


Navigating the identity security landscape

Jeff Reich, Executive Director of the Identity Defined Security Alliance, discusses the challenges security professionals face in the evolving landscape of identity security threats.

View Article

Breaking down DE&I barriers: Practical tips for security leaders

It has never been more critical to double down on diversity in tech to increase innovation and business success through varied strengths and experiences.

View Article

5 crucial cybersecurity resolutions to embrace this World Backup Day

World Backup Day could be the day to institute some resolutions to help plug the gaps and prepare for a world of rising cybercrime and inevitable errors. 

View Article


How to fix the growing cybersecurity skills gap

Cyber and ransomware threats are growing at a rapid rate, critically endangering organizations’ sensitive data. 

View Article


4 practices CISOs should prioritize in their mobile security strategy

The mobile threat is twofold: you must secure your enterprise's mobile apps and mobile devices accessing the enterprise. 

View Article

Talent shortage is leading to automation and outsourcing

A new report discusses trends in automation and outsourcing within IT teams. 

View Article

Adapting to the latest SEC disclosures

Threats such as cyberattacks, supply chain attacks, network intrusions, and ransomware are now an everyday occurrence, causing significant damage. 

View Article

Proactive security: Identify the precursors of violence

Proactive security strategies to help detect and prevent workplace violence.

View Article


Insider risk: Don't ignore the community context

Managing insider risk means also managing the environmental factors that may cause them.

View Article

Recognizing the hidden costs of a security program

Security leaders must be fully aware of the true impact security has on an organization’s bottom line if they want to succeed. 

View Article


The evolution of the corporate security mission

Embedding security into a company's culture helps maintain a competitive advantage. 

View Article

Credential phishing accounted for 91% of active threat reports

Email accounts become a frequent attack victim for threat actors.

View Article


Real-time data and AI are the new weapons against climate disasters

As climate change intensifies extreme weather, the need for intelligent emergency systems becomes even more critical.

View Article

Be ready to quickly find a security job

Steps to help ensure a solid backup plan is in place for when security practitioners need to find a new security job quickly.

View Article

Kristine Raad joins General Motors as Chief Security Officer

Kristine Raad has announced a new position as a Chief Security Officer at General Motors.

View Article

When solution providers host industry conferences

How to choose which security conferences to attend, exhibit at, or present at depends on many different factors.

View Article


Mentorship key in building security careers

Security leaders share the impact mentorship has had on furthering their careers in the industry.

View Article


Report finds that only 5% of businesses have a cyber expert

Although cybersecurity is vital to an organization’s financial success, many companies do not have a designated cyber expert. 

View Article

Stay a step ahead with the missing link in cybercrime defense: OSINT

Adding OSINT-driven threat intelligence to the CISO toolkit can be a game-changer, enabling a proactive approach to cybercrime defenses.

View Article

Building cyber resilience through cyber tabletop exercises

Organizations can use cyber tabletop exercises as a powerful tool to build robust and adaptable cyber defenses.

View Article


Is your financial data safe this tax season?

Explore strategies for individuals, as well as tax preparation organizations, to ensure their data and their clients’ data is protected this tax season.

View Article

Navigating cybersecurity in telecommunications: The FCC's 7-day rule

Under heightened national and economic security scrutiny, telecom operators must rise to the challenge. 

View Article

AI security for CISOs: A dynamic and practical framework

Without the proper foundation or understanding of how to secure their AI systems and address key security concerns, innovation slows or gets stuck. 

View Article

Are AI data poisoning attacks the new software supply chain attack?

With rapid AI adoption happening across varying business units, maintaining the integrity of those systems is a growing concern.

View Article



The cat and mouse ransomware game may threaten smaller organizations

It is possible that cybercriminals will shift from a few large-scale, high-stake ransomware attacks to a broader array of smaller-scale attacks.

View Article




Latest Images