People often think of the cybersecurity industry as the Wild West, but data privacy regulations have been influencing the way companies respond to a data breach for well over a decade.
If you saw a coworker browsing through a database they weren't supposed to have access to, would you report it? New research suggests that employees often underreport such security incidents.
One year in, what have we learned about how General Data Protection Regulation (GDPR) requirements have affected organizations?
Businesses need to adopt a strategic approach to managing third-party risks that provides an integrated view of the vendor relationship process.
It's important to recognize that a core outcome of security awareness and training efforts needs to be changing behaviors.
Whether you're a small startup or an international enterprise, a successful application security program involves more than just scanning for vulnerabilities.
Companies are implementing encryption, but most defenses remain piecemeal. How can security leaders improve protection without sacrificing performance?
Until now, we've looked at the cybersecurity skills gap in a very broad sense, as if all security jobs and needs are equal. Maybe it's time we look at the skills gap problem in different ways.
While smartphones and tablets have become more ubiquitous in the workplace, organizations are flat out ignoring mobile security risks.
To prepare for the CCPA and other upcoming data privacy regulations, start by applying the best practices and frameworks you used to achieve GDPR readiness when the regulation took effect last May.