The "Security Innovation: Secure Systems Start with Foundational Hardware" report from Intel and the Ponemon Institute explores how and why cybersecurity leaders drive security innovation.
Chief information security officers (CISOs) will need to take an end-to-end approach to stay ahead of cybersecurity threats this year and beyond. This entails evaluating the relationship between cybersecurity, storage, and cyber resilience.
From youth outreach to recruitment efforts in high schools, community colleges and universities, cybersecurity leaders can develop the cyber workforce and find talented candidates.
As the cybersecurity industry grapples with the ongoing talent shortage, security operations centers (SOCs) are already overwhelmed, and a constant stream of alerts doesn’t necessarily make their jobs any easier.
Managing third-party risk is integral to maintaining enterprise cybersecurity and supply chain security. Determining who in the enterprise is responsible for third-party vendor security can help reduce risk, according to NCC Group research.
Securing the software supply chain is a monumental task for cybersecurity leaders. A survey from Secure Code Warrior investigated how application developers view security in their work.
The risk of radicalization for private and public organizations is real. Security leaders can mitigate some risk by evaluating processes and procedures.