In light of a regulatory landscape that is becoming more complex and costly, boards need better insight into the organization's risk exposure and its ability to handle cybersecurity risks.
Only one-third of organizations feel their processes for third-party risk management are effective. The root of the issue lies in visibility and ineffective process.
Security data isn't useful when it's isolated in data silos. Organizations need a simplified ecosystem of integrated security solutions to keep up with the shifting threat landscape.
Threat actors have launched a new malware campaign that uses an MitM attack to infect unsuspecting users with the Plead backdoor.
It's important to recognize that a core outcome of security awareness and training efforts needs to be changing behaviors.
The Retefe banking Trojan has resumed its activity with a new series of attack campaigns that leverage Smoke Loader as an intermediate loader.
Organizations that sleep on third-party risk management could unknowingly expose their systems to remote attacks, access risks and more.
Here's what you need to know about organizational security culture — and how to plan for and inspire a better one.
How can security professionals keep up with cybersecurity best practices without taking too much time away from other responsibilities?
Until now, we've looked at the cybersecurity skills gap in a very broad sense, as if all security jobs and needs are equal. Maybe it's time we look at the skills gap problem in different ways.