It's important to recognize that a core outcome of security awareness and training efforts needs to be changing behaviors.
Whether you're a small startup or an international enterprise, a successful application security program involves more than just scanning for vulnerabilities.
Companies are implementing encryption, but most defenses remain piecemeal. How can security leaders improve protection without sacrificing performance?
Until now, we've looked at the cybersecurity skills gap in a very broad sense, as if all security jobs and needs are equal. Maybe it's time we look at the skills gap problem in different ways.
While smartphones and tablets have become more ubiquitous in the workplace, organizations are flat out ignoring mobile security risks.
To prepare for the CCPA and other upcoming data privacy regulations, start by applying the best practices and frameworks you used to achieve GDPR readiness when the regulation took effect last May.
Whether or not you plan on using DNS cookies or DNSSEC, foreseeing an upgrade plan for your software to the latest version made available as part of DNS Flag Day is highly advised.
Organizations adopting NIST 800-53 should understand how upcoming changes will affect senior leadership accountability, data privacy and third-party assessments.
Security researchers discovered that a threat actor is targeting LinkedIn users with fake job offers to deliver the More_eggs backdoor.
Statistically, you're probably not. Even those with cyber insurance often have policies that leave them exposed to certain types of breaches, regulatory fines and real-world financial losses.