The Securities and Exchange Commission (SEC) has proposed changes to standardize public companies’ disclosures regarding cybersecurity risk management, strategy, governance and incident reporting.
CISA and SAFECOM released a new guide to ensure public safety stakeholders have
the information they need to make effective decisions before, during, and after budget cuts,
Security orchestration, automation and response (SOAR) tools can help ease the burden of overwhelmed security operations center (SOC) employees. Dive into the ins and outs of this security management strategy.
Cybersecurity leader Simon Scully brings his security monitoring and vulnerability management experience to his Vice President and Chief Information Security Officer roles at Venerable.
The Cybersecurity and Infrastructure Security Agency has released Capability Enhancement Guide (CEG): Social Media Account Protection, which details ways to protect the security of organization-run social media accounts.
Just as you wouldn’t recommend going to a basement during a fire nor running outside during a tornado, it is crucial to outline safety plans according to cyber disasters. Organizations can do this by implementing a business cybersecurity plan.
This year, on October 13th, the BlackBerry Security Summit 2021 took place — fully virtual. Keynote speakers included a range of BlackBerry organizational leaders across specialties, from Cybersecurity and Threat Detection to Product Management and Engineering.
Researchers have helped patch a high-severity-rated security flaw in a popular WordPress plugin, which could be exploited to completely wipe and reset any vulnerable WordPress website.