This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Video conferencing platforms like Zoom, Cisco, Google and Microsoft have helped enable remote work — but they also present security challenges. An international consortium reviewed the state of video teleconferencing platforms and how cybersecurity leaders can ensure their safety.
After decades of building security operation centers (SOCs) and developing enterprise cybersecurity programs, Sumo Logic Chief Security Officer (CSO) George Gerchow reflects on how best to instill a security-minded culture in an organization in the latest The Security Podcasts episode.
The University of Arkansas has announced the adoption of cybersecurity measures to better protect its IT assets, including data and identity management initiatives.
Blockchain can help cybersecurity professionals looking to secure mobile applications with its transparency, decentralization and the encryption it provides.
Securing remote work, allocating investments toward cybersecurity initiatives, and implementing responsible artificial intelligence (AI) technology are top enterprise cyber trends to watch in 2022.
Security orchestration, automation and response (SOAR) tools can help ease the burden of overwhelmed security operations center (SOC) employees. Dive into the ins and outs of this security management strategy.
Cybersecurity training, two-factor authentication, updating communication strategies and developing an attack strategy can help healthcare organizations bolster their cybersecurity strategy.