Russian food delivery app Yandex Food has reported a data breach found to contain location and contact data for Russian military and security agencies.
Review the risks and rewards involved with information sharing, a necessary challenge for Chief Information Security Officers (CISOs) looking to stay on the front edge of cybersecurity.
When it comes to insider threats and document protection, security leaders can take a few practical steps to mitigating both intentional and unintentional breaches.
Listen to the latest The Security Podcasts episode as we talk with Stephanie Jaros about insider risk, building an appropriate program, and the criticality of when to address such threats.
The U.K.-based Transparency International Defence and Security Programme has released the findings of its Government Defence Integrity Index (GDI), which measures the risk of corruption in state defense and security.
Stephanie Jaros, Director of Research for the U.S. Department of Defense’s (DoD) counter-insider threat program, talks to Security about the integration of the human and behavioral sciences into insider threat mitigation, as well as the criticality of the timeline when it comes to addressing such risks.
A new survey from Pulse and Hitachi ID reveals that nearly half of all enterprise team members have been approached by cybercriminals to assist a ransomware attack.
By focusing on the three V’s — volume, velocity and visibility — of Software as a Service (SaaS) security, organizations can streamline and improve their security team’s efficiency, reducing their workload and increasing protection for the company against any potential exposure or data breach.