How to secure distributed organizations, protect sensitive information and comply with regulation
ISACA adviser Safia Kazi on the ways companies trick you into sharing personal data, the need to protect that data, and why we need more women in tech.
As the explosive events in Ukraine prove, for government and enterprise alike, there’s never been a more critical time to rely on threat hunters. Here’s how to build your squad.
As the West responds to Russia’s invasion of Ukraine and braces for retaliatory cyberattacks, organizations around the world are assessing supply chain risks, patch management plans, and other cyber hygiene protocols.
Rand Corporation researcher and Washington insider Quentin Hodgson lays out why private enterprise should be just as interested as the feds in CISA’s strategy to combat hackers.
A constant flow of new threats makes staying on top of trends—like zero trust, supply chain security, and compliance issues—more important than ever.
Device vulnerability management uses specialized tools to monitor an organization’s devices and detect and resolve configuration issues that could open it to cyberattack.
Real-time risk monitoring is a critical piece of the compliance puzzle.
A conversation with Deep Instinct’s Guy Caspi on how his company is deploying the most crucial new weapon in the digital security arsenal.
Here’s how I set cybersecurity strategy for the state of Arizona—and why others should follow our lead.
The FTC plans to pursue companies that fail to patch the Log4j vulnerability. For CISOs, that’s just one concern.