In theory, dealing with BlueKeep should be no different from dealing with other vulnerabilities. Unfortunately, many organizations are lagging in their patch management efforts.
The demands of digital transformation, business agility, migration to the cloud and more have radically changed the data security challenges enterprises face today.
While risk assessment is a regular topic of conversation today, when it comes to practicing good risk estimations and decisions in our daily lives, humans have some serious shortcomings.
High-risk, low-noise lateral movement attacks are becoming more common, and organizations need to adapt their strategic, tactical and operational defenses.
A crypto agility plan can help minimize panic and chaos should the need arise to quickly switch encryption algorithms.
In the near future, we're going to see the role of office power broker shift from an administrative assistant to a virtual assistant. How does the CISO's role change in this cognitive enterprise?
One year in, what have we learned about how General Data Protection Regulation (GDPR) requirements have affected organizations?
Quantum computing is here, and organizations must embrace new and evolving standards and methods of cryptography to protect their data from the emerging threat of quantum attacks.
MMOs offer key lessons to help enterprises improve their cybersecurity best practices. Here's a look at the top three.
People Inc., a nonprofit organization based in New York state, has traced a recent data breach to compromised employee email accounts.