Security leaders must communicate effectively with executives and monitor users for signs that the organization is about to suffer a security breach.
The latest edition of the IBM X-Force Threat Intelligence Index detailed how companies were affected by data breaches during the "year of the mega breach."
The classic image of the Hollywood hacker is misleading. The typical cybercriminal is more likely to be a state-sponsored actor or malicious insider.
Blockchain has the potential to revolutionize the way businesses conduct financial transactions in the next few years, according to security experts.
Customer data could be at risk after a bug at content delivery specialist Cloudflare spilled private information from its clients online.
According to the results of a recent Ponemon Institute survey, 76 percent of organizations lack a holistic risk management strategy.
To limit the potentially debilitating financial impact of a security breach, many companies opt to take out cyber insurance policies.
In addition to responding to threats in progress, crisis leadership involves rehearsing various responses to prepare for a data breach.
Humans represent the weakest link in the cybersecurity chain. An effective defense strategy starts and ends with cyber situational awareness.
IT managers must know what types of data cybercriminals covet to close any security loopholes that might lead to a security breach.