New data from security training provider shows half of untrained users in consulting, energy, and healthcare industries fall for phishing attacks.
Read more5 Traits That Differentiate CISOs From CIROs
July 12 2022Chief information risk officers must have a keen understanding of — and interaction with — the business.
Read more5 Traits That Differentiate CISOs From CIROs
July 12 2022Chief information risk officers must have a keen understanding of — and interaction with — the business.
Read moreWhether data's in motion, at rest, or in use, confidential computing makes moving workloads to the public cloud safer, and can enhance data security in other deployments.
Read more"We paid the crooks to keep things under control and make a bad thing better"... isn't a valid excuse. Who knew?
Read moreIf you're not teaching all of your employees proper security hygiene, you are leaving the door open to risk. Close that door by providing accessible training.
Read moreIf you're not teaching all of your employees proper security hygiene, you are leaving the door open to risk. Close that door by providing accessible training.
Read moreHonda vehicles from 2021 to 2022 are vulnerable to this attack:
On Thursday, a security researcher who goes by Kevin2600 published a technical report and videos on a...
Read more
Cybersecurity insurance costs are rising, and insurers are likely to demand more direct access to organizational metrics and measures to make more accurate risk assessments.
Read more
Recent Comments