What are the tools and processes necessary to develop a comprehensive security program into a mature vulnerability assessment and risk management program?
The "Security Program Management: Priorities and Strategies" study from Blue Lava and Aimpoint Group explores how security leaders measure and manage security programs and communicate priorities to executives and boards, highlighting the importance of security benchmarking.
Technology innovation, global terrorism and cybercrime were named as top international threats by the 2022 Annual Threat Assessment of the Intelligence Community, prepared by the U.S. Office of the National Intelligence Director.
Cybersecurity legislation from the European Union, the Digital Services Act, has wider implications for global online fraud and misinformation mitigation campaigns.
Charles "Chuck" Miller, former SVP of Cybersecurity at Truist and SunTrust, has been named the new Chief Information Security Officer (CISO) at Blackbaud, a cloud software company.
Managing third-party risk is integral to maintaining enterprise cybersecurity and supply chain security. Determining who in the enterprise is responsible for third-party vendor security can help reduce risk, according to NCC Group research.
Cyber insurance premiums are rising, and enterprise organizations looking into insurance have to meet various cybersecurity standards before gaining coverage. Standardizing risk measurements may help the industry stay protected in a time marked by rising cyberattacks.
K-12 school administrators and cybersecurity leaders outlined their top four challenges to securing their educational institutions in the "Creating a Common Culture of Action Around Cybersecurity: 2021 National K-12 Education Cybersecurity Report" from iboss.