If shadow IT is a problem with business decision makers, that may be a sign your senior security person isn't engaged at a high enough level.
Stories by Kacy Zurkus
Security vendors are jumping on the data science, machine learning, AI bandwagon, but don't believe the hype. Here's how to make sure the vendor you're evaluating can make good on its promises of data science prowess.
Today's reality is that if the enterprise uses networked computers, they will get hit at some point. Not having and practicing a recovery plan could be the doom of any organization.
Being judicious about social media use and staying away from WiFi protects executives and the enterprise.
Trusting that the solutions won't fail and users won't click could lead to a breach
Thinking about making the idea of cloud a reality for today's enterprise
The metrics to use to determine where to make improvements in security awareness training
Diverse group of security experts weigh in on strategies and best practices for making security everybody's job at MASSTLC
Because there are so many different kinds of third parties, identifying whether they do or don’t have the right infrastructure or security protocols can be a challenge.
How much do network architects take security into account when building websites, and does testing extend out to third-party code?
Angler, Magnitude, and Nuclear are a few of the most commonly used exploit kits criminals are using to deliver a variety of payloads from botnets to ransomware.
Focusing too much on protecting only the crown jewels of the enterprise might leave gaps in security for criminals who are seeking other valuable assets.
Cybersecurity has long been one of the main issues keeping CIOs awake at night. Now, with the number of high-profile cyberattacks seeming to increase each month, security is haunting IT leaders during the daytime, too.
Whether the goal is to attract new talent, retain highly qualified employees or develop an internal path to leadership, companies looking to create educational or coaching programs can either go it alone or, like most business processes these days, outsource part or all of the training function to a third-party.
Though all vastly different in scale and impact, the breaches at the Office of Personnel Management (OPM), Sally Beauty Supply, Starbucks, Anthem, Adult Friend Finder, and Penn State teach valuable lessons and reminders about security vulnerabilities and the need to do more to protect against attackers.