Cybersecurity leader Simon Scully brings his security monitoring and vulnerability management experience to his Vice President and Chief Information Security Officer roles at Venerable.
The Cybersecurity and Infrastructure Security Agency has released Capability Enhancement Guide (CEG): Social Media Account Protection, which details ways to protect the security of organization-run social media accounts.
Just as you wouldn’t recommend going to a basement during a fire nor running outside during a tornado, it is crucial to outline safety plans according to cyber disasters. Organizations can do this by implementing a business cybersecurity plan.
This year, on October 13th, the BlackBerry Security Summit 2021 took place — fully virtual. Keynote speakers included a range of BlackBerry organizational leaders across specialties, from Cybersecurity and Threat Detection to Product Management and Engineering.
Researchers have helped patch a high-severity-rated security flaw in a popular WordPress plugin, which could be exploited to completely wipe and reset any vulnerable WordPress website.
Disaster recovery solutions make it easy for administrators to prevent data loss caused by failure events or ransomware, even when they cannot be on-site.
Applying the Sun Tzu approach to cybersecurity gives organizations the awareness of what to look for, what vulnerabilities create the most risk and how to implement the appropriate incident response procedures.
How do you find, hire and create the perfect threat hunter team? Troy Gill, Manager of Security Research and Zix’s AppRiver Threat Research Team, speaks to what it takes to be an exceptional threat hunter and what qualities they need to be successful.