Protecting Candidate Privacy During Background Checks Organizations must carry out thorough background checks while respecting candidate privacy. Jordyn Alger May 12, 2025 With proper data security plans in place, organizations can conduct effective background checks while protecting candidate privacy.Read More
Upskilling security teams: Breaking down silos and elevating expertise Mike Wiacek April 30, 2025 Cybersecurity isn’t just about technology — it’s about people. Read More
How higher education can protect student data from cyber siege Brent Johnson April 29, 2025 Practical solutions to strengthen an educational institution’s defenses without overburdening staff or incurring significant expense. Read More
Frontline lessons: What cybersecurity leaders can learn from attacks Victoria Dimmick April 25, 2025 The companies that will thrive in the face of constant cyber threats are those that embed security into who they are, not just what they do.Read More
Why red teaming matters even more when AI starts setting its own agenda Brenda Leong April 23, 2025 AI tools are quickly being designed to grow more capable and more autonomous — and therefore more unpredictable. Read More
The recession-proof security leader: How CISOs can do more with less Emanuel Salmona April 23, 2025 In an economic environment where executives are scrutinizing every investment, the leaders who stand out aren’t the ones promising the most protection.Read More
Not so innocent: Malware-laden memes on the rise Erich Kron April 21, 2025 Cybercriminals are refining their methods to use malicious memes as a tool to bypass security controls by embedding dangerous code into image files.Read More
5 Minutes With Increased visibility leads to increased cyber resilience Jordyn Alger April 21, 2025 Security magazine talks with David Kellerman, Field CTO at Cymulate, about the risks of silos and how security leaders can improve visibility. Read More
New to cybersecurity and need experience? Start with bug bounties Angela Ramos Michiel Prins April 17, 2025 Bug bounty programs provide invaluable learning opportunities for aspiring cybersecurity professionals. Read More
Recognizing cybersecurity as a revenue growth strategy Reinhard Hochrieser April 16, 2025 Traditionally, cybersecurity has been viewed as a cost center, but forward-thinking enterprises are reframing it as a growth driver.Read More