This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
In this Cybersecurity & Geopolitical Discussion episode, Phillip Ingram and Ian Thornton-Trump discuss the background and recent events in Africa with guest Lisa Forte from Red Goat Cybersecurity.
It’s time for companies to take a tough stance on preventing data leakage and cyber theft, and adopt cybersecurity measures during the digital production process.
In today’s threat environment, alerts aren’t enough. Security teams need to shift from an alert mindset to a security posture that relies on contextualized threat intelligence.
Security's Associate Editor Maria Henriquez analyzes the top data breaches of 2022 and their effects on enterprise cybersecurity and national legislation going forward.
Cybersecurity teams are bogged down by alert fatigue and a lack of attack surface visibility. Leveraging the cyberattacker perspective can help reduce IT security risk.
In Episode 13 of the Cybersecurity and Geopolitical Podcast series, hosts Ian Thornton-Trump and Philip Ingram discuss the geopolitical threat landscape involving Russia, China, Iran and North Korea.