AI security for CISOs: A dynamic and practical framework Omar Khawaja April 17, 2024 Without the proper foundation or understanding of how to secure their AI systems and address key security concerns, innovation slows or gets stuck. Read More
Navigating cybersecurity in telecommunications: The FCC's 7-day rule Michael Isbitski April 16, 2024 Under heightened national and economic security scrutiny, telecom operators must rise to the challenge. Read More
Rethinking network and security monitoring in the age of TLS 1.3 Scott Aken April 16, 2024 The adoption of the TLS 1.3 creates a watershed moment for cybersecurity, revolutionizing encryption and data protection standards.Read More
Is your financial data safe this tax season? Narayana Pappu April 15, 2024 Explore strategies for individuals, as well as tax preparation organizations, to ensure their data and their clients’ data is protected this tax season.Read More
Cyber Tactics Building cyber resilience through cyber tabletop exercises More than a simulation, CTTX can be a powerful tool for building a robust and adaptable cyber defense. Pam Nigro April 15, 2024 Organizations can use cyber tabletop exercises as a powerful tool to build robust and adaptable cyber defenses.Read More
Stay a step ahead with the missing link in cybercrime defense: OSINT Michael McLaughlin April 15, 2024 Adding OSINT-driven threat intelligence to the CISO toolkit can be a game-changer, enabling a proactive approach to cybercrime defenses.Read More
Report finds that only 5% of businesses have a cyber expert Security Staff April 12, 2024 Although cybersecurity is vital to an organization’s financial success, many companies do not have a designated cyber expert. Read More
Recognizing the hidden costs of a security program Eitan Worcel April 9, 2024 Security leaders must be fully aware of the true impact security has on an organization’s bottom line if they want to succeed. Read More
An ally for organizations navigating the complex cyber terrain Brian Neuhaus April 5, 2024 The evolution of the NIST Cybersecurity Framework in its 2.0 iteration underscores a significant paradigm shift towards a governance-focused approach.Read More
4 practices CISOs should prioritize in their mobile security strategy Krishna Vishnubhotla April 1, 2024 The mobile threat is twofold: you must secure your enterprise's mobile apps and mobile devices accessing the enterprise. Read More