To protect their networks from insider threats, security teams need greater visibility into privileged accounts held by both employees and third-party vendors.
Corporate VPN security still plays a vital role in protecting enterprise networks, but it is no longer sufficient to prevent unauthorized third-party or privileged access on its own.
Organizations preparing for GDPR should reach out to their third-party vendors to clearly define the roles, expectations and responsibilities of data controllers and processors.
IBM X-Force monitored major data breach trends throughout 2017 and gleaned key insights to help companies avoid headline-grabbing security incidents.
To avoid becoming the next piece of cybersecurity news, IT leaders must assess the security posture of third-party providers.
Companies looking to minimize retail disruption during this holiday season should keep close tabs on emerging trends such as ransomware, the IoT and more.
Fail-safe measures such as encryption can help organizations minimize cloud and third-party risks in the virtually inevitable event of a data breach.
A recent survey by cloud security firm RedLock attributed the rise in cloud data leaks to inadequate policies, lack of compliance and other poor practices.
Security leaders in the health care, financial services, and energy and utilities sectors must pay special attention to industry-specific security risks.
To prepare for the upcoming "Star Trek: Discovery" series, here are eight cybersecurity lessons companies can learn from the science fiction franchise.