A recent survey found that the retail industry is among the least secure industries. What can retailers do to turn that around this holiday season?
By embracing the dervied credentials approach to personal identity verification, companies can deliver strong authentication, scalability, adherence to NIST guidelines, and ease of use and deployment.
How Security Consultant Ben Goodrich Uses Physics to Navigate the State of Constant Change in Cybersecurity
Just three years ago Ben Goodrich graduated with a degree in physics. Today he's a security consultant working with the world's biggest companies to provide an injection of cybersecurity expertise.
Insider threats are not only the most common cause of cybersecurity risk, but also the costliest and hardest to detect.
By presenting the right security metrics to executives, CISOs can develop a strong business case for greater investment in cybersecurity.
Given the increasingly sophisticated and interconnected nature of the cyberthreat landscape, organizations must collaborate across sectors to improve cyber resilience around the world.
The International Standards Organization (ISO) recently released an updated version of its security risk-management guidelines, ISO/IEC 27005:2018. Here are the key lessons.
With GDPR in full swing, organizations need to prepare their incident response plans to move swiftly in the event of a breach and meet the mandated 72-hour incident disclosure window.
The U.S. government's Defense Federal Acquisition Regulation Supplement (DFARS) aims to help the DOD protect its own data and that of its business partners through multifactor authentication (MFA).
New privacy regulations in California, the U.K. and other areas are adding to the number of frameworks CISOs say they have to study to make the best internal budgetary decisions.