Crisis management leaders need to be able to communicate effectively and in real time in order to ensure the safety of their communities. When it comes to communication platforms, there are many aspects to consider when selecting the most secure tool for first responders.
It’s time to re-evaluate the modern data stack to relieve friction points and ensure both accessibility and compliance. By automating security workflows and controls across data stores and integrating into self-service access, productivity and innovation will thrive.
Elias Oxendine has been named Chief Information Security Officer (CISO) at Yum! Brands, a fast food provider operating Pizza Hut, Taco Bell and other restaurants around the globe.
The Federal Trade Commission (FTC) has issued a warning that it will pursue any company that fails to protect its customers’ data against ongoing Log4j attacks.
The "Beyond the Cyber EO: How to Build a Better Mousetrap" report from MeriTalk asked federal cybersecurity leaders for their thoughts on the May 2021 executive order on cybersecurity and how the field can move forward.
Here are seven questions to ask vendors to guide your organization's evaluation of enterprise resource planning (ERP) application security, risk and compliance solutions.
A new study from Telos Corporation and conducted by Vanson Bourne, "Critical IT Assets Need Protection Beyond Standard Network Security," revealed that 99% of security professionals believe an attack on their critical IT assets would have both organizational and societal repercussions.