While blockchain technology holds promise for cloud security, it's not the singular missing link. To ensure data privacy, blockchain must be properly integrated with existing apps and services.
Now is the time for organizations to move forward with their GDPR readiness plans and ensure that compliance activities are embedded into their overall security strategy.
Organizations can significantly reduce the risk and cost of ransomware recovery by investing in cloud data protection tools that feature file and object store encryption capabilities.
The sweeping General Data Protection Regulation (GDPR) from the European Union (EU) intends to revolutionize the relationships of data holders or processors and the people associated with that data.
Meeting the European Union's GDPR compliance has been a source of continuing difficulty and discussion for businesses.
When Lincoln Healthcare experiences a watering hole attack, security operations center (SOC) director Malcolm Gerhard is tasked with developing a swift cybersecurity incident response. Will he succeed?
Human error, credential misuse and disgruntled employees aren't the most common threats security leaders have to face — but the complexities of these incidents make insider threats the stuff of CISO nightmares.
What happens when a malware infection results in permanent loss of data, operational downtime and significant reputational damage? Experience the cyber resilience failures of airline CIO Martin Kinsley.
Follow along with risk and compliance officer Frank Roth as he endeavors to fill in the gaps of an outdated (and incomplete) risk management framework in his new role at a utility company.
Follow the decision-making process of IT director Shira Sutton as she endeavors to avoid security risks and unnecessary business continuity headaches on the journey to cloud transformation.