Not only do cybersecurity leaders mitigate technology errors in their organizations' assets, but they also have to consider the risk of user error. Eliminating normalcy bias can help cyber leaders mitigate user risk.
Most security breaches aren’t a consequence of inadequate security controls but are a direct result of human failure. So why do humans make mistakes? What triggers our behavior, and why are we so susceptible to manipulation? Understanding these triggers will greatly help organizations change their approach to information security.
In a recent update, Panasonic has verified that hackers accessed personal information belonging to job candidates and interns during a November cyberattack.
The New York Office of the Attorney General (OAG) notified 17 well-known online retailers, restaurant chains and food delivery services that have been the victims of credential stuffing attacks.
Supply chain security, public health and employee retention ruled the headlines in 2021. Reflecting on the past twelve months, physical security leaders share their insights on where to focus security priorities in 2022.
Discrepancies in who and how many individuals were affected by a recent data breach of the Rhode Island Public Transit Authority may be resolved by an ongoing cyber investigation.
Data privacy leaders from the International Association of Privacy Professionals (IAPP) highlight what to expect in the field from increased privacy regulations to global data management practices.