In a new podcast episode, Erez Yalon, Vice President of Security Research at Checkmarx, talks how security leaders can avoid common cybersecurity mistakes in their organizations.
Cynet CISO survey reveals lack of staff, skills and resources are driving smaller teams to outsource security with advanced tools, technologies and services.
CrowdStrike Chief Technology Officer Michael Sentonas explains why identity security must be an urgent priority for business leaders, as well as how zero trust helps contain adversaries in attacks involving identity.
In today’s world, where any energy organization can be a target for cyberattack, secure network architecture and end-to-end visibility are the building blocks to a resilient cybersecurity posture.
The Ronald McDonald House Charities of Central Texas implemented a cloud video surveillance system from Eagle Eye Networks to improve operational efficiencies. Learn more in this case study.
The Occupational Safety and Health Administration (OSHA)'s "Weekend Work" initiative will conduct construction site safety inspections on weekends, when security supervision may be more lax.
The U.S. Department of Energy (DOE) Office of Cybersecurity, Energy Security and Emergency Response (CESER) has released version 2.1 of the Cybersecurity Capability Maturity Model (C2M2).
Smart city technologies and urban big data produce data privacy concerns. For any data-driven smart city project to be successful, it must communicate its value and data safety to its primary stakeholders — the citizens.