Cybersecurity experts recommend that smartphone owners take a number of steps to keep their mobile devices safe and secure. These include using a pass code to gain access to the phone, as well as regularly updating a phone’s apps and operating system. Many Americans, however, are not adhering to these best practices, according to a Pew Research Center report.
According to new research from the Center for Cyber Safety and Education (the Center) and the Executive Women's Forum on Information Security, Risk Management & Privacy (EWF), women comprise only 11 percent of the information security workforce a number that has remained steady since 2013.
The international community looked on with increasing concern and interest last week as the security situation in parts of Nigeria looks increasingly volatile. The kidnapping of two German archeologists in central Nigeria on Wednesday further heightened worries regarding the safety and security of foreign visitors to the county.
There is a widespread and growing need to improve security practices surrounding confidential documents in most organizations today, according to a new study by the Business Performance Innovation (BPI) Network.
Consumers across the globe are more concerned with protecting their financial and payments information stored on a computer than they are with protecting this data when stored on a mobile wallet, according to data.
U.S. Senators John Cornyn (R-TX), Patrick Leahy (D-VT), and Ted Cruz (R-TX) have introduced the National Cybersecurity Preparedness Consortium Act to authorize the U.S. Department of Homeland Security to work with the National Cybersecurity Preparedness Consortium (NCPC) to help prepare for and respond to cybersecurity risks at the national, state, and local levels.
Thinking of building your own Global Security Operations Center? Learn from four leading enterprises about how they developed or modified their GSOCs to bring the most value to their enterprises. Also in this issue: how to attract better cybersecurity talent, healthcare data compliance, working with integrators to test security technology, the 2017 ISC West Product Preview and much more!