When the perspectives of CISOs and experts at RSAC 2019 are viewed as a continuum, you can begin to see a story emerging about the state of cybersecurity in 2019.
In a world where technology and culture are one and the same, public-interest technologists are critical to a better future.
Deepfake videos that are indistinguishable from authentic videos are coming, and we can scarcely imagine what they'll be used for. We should start preparing for the worst.
Spring is just around the corner, which means it's time for CISOs to evaluate their security strategy, eliminate processes that aren't working, and adopt new cybersecurity practices and technologies.
The decentralized nature of blockchain, coupled with consensus protocols, helps to address some security needs, but the consequences can be dire if security isn't fully explored.
Security researchers observed the Razy Trojan installing malicious extensions across multiple web browsers to steal cryptocurrency.
Just how well are organizations informing stakeholders about cyber risks? That was the question that EY sought to answer in their recent "Cybersecurity disclosure benchmarking" report.
By leveraging blockchain for business, organizations can clarify historical records and streamline transactions while significantly boosting overall enterprise security.
A new threat intelligence sharing network allows companies to control both who has access to information and the quality of anonymous threat data they consume.
West Virginia launched a pilot program to enable members of the military to cast ballots for November's U.S. elections on their mobile devices, but some experts are concerned about voting security.