In the near future, we're going to see the role of office power broker shift from an administrative assistant to a virtual assistant. How does the CISO's role change in this cognitive enterprise?
People Inc., a nonprofit organization based in New York state, has traced a recent data breach to compromised employee email accounts.
As tools and systems in the market evolve, there is a great opportunity for organizations to begin their journey of automating their privacy initiatives.
This update can be seen as part of a wider trend in data privacy regulations where guidelines on breach reporting and incident response documentation are becoming more specific.
Travel security is now paramount, as attackers are shifting their focus to transportation organizations and setting their sights on travelers' PII.
In light of a regulatory landscape that is becoming more complex and costly, boards need better insight into the organization's risk exposure and its ability to handle cybersecurity risks.
Is providing effective cybersecurity for the healthcare sector an IT problem or a wider-scope issue? The short answer is that it's both.
For the enterprise responsible for protecting customers' PII, should passwords be stored at all — even encrypted?
Companies are implementing encryption, but most defenses remain piecemeal. How can security leaders improve protection without sacrificing performance?
The rollout of 5G technology could forever change how we manage mobile security, posing an entirely new set of risks we have not handled before.