A security escape room can be a fun and interactive way to train employees on various security concepts they might otherwise ignore.
Many organizations are paying much more than they realize for endpoint management in terms of money, resources and speed. Where do these hidden costs come from, and how can companies reduce them?
To establish a consolidated data risk management program, the chief information security officer (CISO), chief data officer (CDO) and chief risk officer (CRO) must be on the same page.
How Security Consultant Ben Goodrich Uses Physics to Navigate the State of Constant Change in Cybersecurity
Just three years ago Ben Goodrich graduated with a degree in physics. Today he's a security consultant working with the world's biggest companies to provide an injection of cybersecurity expertise.
Increasingly, businesses are focusing more on ruggedized and IoT device management, compliance of their endpoints, and developing an overall strategy to secure these types of devices.
To improve the company's overall cyber resilience posture, security leaders must promote a culture of cybersecurity awareness from the top down. They can start by debunking these six common myths.
The capacity to express technical IT concepts in business terms is critical to a better, more informed decision-making process when it comes to user access and separation of duties.
Personal health information is extremely valuable to threat actors, and companies that store customers' health data need to be wary of healthcare cyberattacks that could threaten their business.
With many organizations now dependent on iOS devices, security leaders must balance productivity and security with the right endpoint management solution.
Most companies still are not fully up to speed on GDPR compliance. Starting in 2020, they'll have a whole new regulatory maze to navigate: California's Consumer Privacy Act.