CISA is now accepting nominations for the new Cyber Innovation Fellows program, who will lend their expertise to CISA's technical teams on threat hunting, incident response and vulnerability management.
The Okta, GitHub and MailChimp supply chain breaches illustrate the inherent risks of leaving your supply chain in the dark. What can be done to mitigate these risks?
Bec McKeown, Immersive Labs’ Director of Human Science has been researching impacts of security and crisis response, and electronic warfare for more than 15 years. What does the research say and how can security leaders get ahead of it?
There's a new Linux threat: the Symbiote malware. Its main objective is to harvest credentials and facilitate backdoor access to infected machines, according to new BlackBerry and Intezer research.
Purposeful collaboration is fundamental to getting security right. To create this sense of community, security teams need to regularly engage employees, inform leadership, and demonstrate organizational value.
Any comprehensive approach to cybersecurity must include a detailed third-party risk assessment, covering an assessment of how partners view governance, risk, and compliance within their own organizations.
Given the increase of attacks on critical infrastructure and third-party suppliers and supply chain partners, let's address security concerns for supply chains and quick solutions.