Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.
Recent: |
|
Past: |
|
Some security vendors are stepping up to help organizations better protect their networks as employees must suddenly work from home. → Read More
This year’s RSA Conference is a key venue for companies to showcase their new cybersecurity products. Here are some of the more interesting tools to check out. → Read More
One CISO's collection of phishing emails provides insight into how the practice is evolving. That allows for better identification and prevention of phishing. → Read More
How will the nature and consequences of data breaches change in the coming year? Industry experts weigh in with their predictions. → Read More
IT and security management use more technology to defend against sophisticated hacker attacks, but still lag on security training. → Read More
The GDPR and other privacy regulations are creating new opportunities for cyber criminals and roadblocks for security teams, while in some cases putting personal data at greater risk. → Read More
New intelligent identity management systems are changing the way organizations authenticate users and devices, and they’re making identity the new security perimeter. → Read More
A move to a pure cloud strategy at the London Stock Exchange Group forced a new security mindset. Here's how the LSEG's CISO faced the challenge. → Read More
Officially called 23 NYCRR 500, this regulation requires financial services firms doing business in New York to have a full security risk assessment and plan. → Read More
Failure to report breaches within the rules of the many global data and privacy protection regulations can result in penalties. Planning ahead will help avoid that. → Read More
Ransomware creators are getting more sophisticated in how they infect systems, avoid detection, and foil decryption efforts. → Read More
An extreme approach to protecting privacy can actually make personal data less safe. Don’t overreact. → Read More
Healthcare continues to be a popular target for ransomware, cryptomining, data theft, phishing, and insider threats. → Read More
Criminals are using ransomware-like tactics and poisoned websites to get your employees’ computers to mine cryptocurrencies. Here’s what you can do to stop it. → Read More
The chief information security officer has a big, mission critical job. Make sure you spell out the CISO's duties and expectations for the role. → Read More
Let’s face it: 2017 was a terrible year for cyber security with more phishing scams, ransomware, state-sponsored attacks, and new attack vectors. Will 2018 be better? → Read More
Password-only authentication is dead. Combine passwords with multifactor authentication, social login, biometrics, or risk-based authentication to better protect users and your reputation. → Read More
Industry and government cybersecurity experts offer advice for protecting business assets and reputation in an increasingly dangerous cyber threat landscape. → Read More
Manufacturing giant GE takes a holistic approach to industrial internet of things (IIoT) security that integrates enterprise and product security. CISO Nasrin Rezai explains why this is important and how it works. → Read More
GDPR is a regulation that requires businesses to protect the personal data and privacy of EU citizens for transactions that occur within EU member states. And non-compliance could cost companies dearly. Here’s what every company that does business in Europe needs to know about GDPR. → Read More