Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.
Recent: |
|
Past: |
|
Despite some of the most noted ‘leakers’ now having served their punishments, the insider threat still looms large over industry as the most hard to detect and potentially, providing the most dire consequence for a company to find itself in. → Read More
Globally cybersecurity is in crisis not solely from a lack of skilled personnel, but also from a lack of strategic direction and company’s inability to hire staff in an expedient, effective and efficient manner. → Read More
Former Scotland Yard detective discusses cybercrime and threat intelligence. Steve Santorelli, passionate about Internet Security and committed to bringing folks together to attack the problem in many ways. → Read More
The growth of ISACs will continue as more companies learn that mature cyber security programs all share information to make their enterprises more resilient. Enterprise risk management today has significant upside to improve maturity in the next 10 years. → Read More
On Tuesday, the Department of Justice, U.S. Attorney’s Office, Central District of California announced that Ryan Collins, 36, of Lancaster, Pennsylvania, plead guilty to violation of the Computer Fraud and Abuse Act. → Read More
We will discuss cybersecurity reliability, authentication after the mobile phone, EU General Data Protection Regulation, the role of the CISO and systems could protect users from themselves. → Read More
Five questions with Raj Samani, VP, CTO for McAfee EMEA A five question interview on current topics in cybersecurity. One question may even surprise you. → Read More
We will explore the issues of reputational damage, incident cost, stock price impact, and increased regulatory attention. We will also discuss the fate of four CEOs who have faced cybersecurity breaches in the past three years. → Read More
Unfortunately, the issue at hand is not as simple as the FBI or Apple would have us believe. → Read More
Fraud as a Service (FaaS) has matured to the level of diversification and specialization. In the arena of cybercrime, groups have emerged into areas of specialization, with the top of the food chain acting as general contractors. → Read More
Shedding light on the dark art of managing cyber risk. → Read More