Seasoned chief information officer Michael Lillie brings extensive information technology, information security and business strategy experience to his new role at OneSpan.
Cyber threat actors don't take holidays off. This Fourth of July weekend, take steps to ensure the right people, processes and tools are in place to reduce the risk of cyberattacks, or respond to a ransomware attack.
The massive Kaseya security breach that impacted thousands forced the industry to re-evaluate their software supply chain security practices. Here we break down the cybersecurity lessons that still need to be learned.
Compliance is vital. But when it justifies the status quo, a compliance-only approach to cybersecurity can be counterproductive. However, the adoption of a risk management approach can be the most useful to enterprise cybersecurity teams.
Privileged access management (PAM) is vital for enterprise security. With proper PAM tools, procedures and processes in place, organizations can lessen the risk of being the next data breach victim.
As new members join, security management teams must get ahead of the insider threat.
What steps can be taken to protect the organization's crown jewels, or known and unknown assets?
Insider threats can cause extensive damage to national security. To combat this threat, the U.S. must update and adapt current security practices, including the background check process.
CISA published the second version of Cloud Security Technical Reference Architecture (TRA), which seeks to guide agencies’ secure migration to the cloud by defining and clarifying considerations for shared services, cloud migration and cloud security posture management.