This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
The University of West Florida and the Jikei College Group in Japan announced a partnership that aims to enhance global cybersecurity workforce development.
Differences in cultural values have led some countries to tackle cyber attacks with increased internet regulation, while others have taken a ‘hands-off’ approach to online security.
What is a Defense-in-Depth strategy, and why has it come to be acknowledged as Expense-in-Depth? How can CISO's communicate the business value of this strategy?
The Cybersecurity and Infrastructure Security Agency (CISA) issued a draft binding operational directive, BOD 20-01, which will require federal civilian executive branch agencies to publish a vulnerability disclosure policy (VDP).
The Common Weakness Enumeration (CWE™) released its Top 25 Most Dangerous Software Errors (CWE Top 25), a demonstrative list of the most widespread and critical weaknesses that can lead to serious vulnerabilities in software.
Local government agencies are reminding citizens to take necessary precautions to be safe this holiday season, such as "See Something, Say Something," to report any terrorism-related behavior and to be aware that scammers, online and in-store, are targeting shoppers this holiday season.
U.S. Senators unveiled comprehensive federal online privacy legislation to establish privacy rights, outlaw harmful and deceptive practices and improve data security safeguards.
Why are mid-sized organizations increasingly putting their hope in Managed Detection and Response providers who focus on real-time triage and investigation into data breach signals as they happen?
Though data breaches are a serious issue for large enterprise organizations, especially from a reputation perspective, the threat of compromise is a top concern for most small and midsized businesses (SMBs), too.