A breach of the GoDaddy Managed WordPress hosting environment exposed information from up to 1.2 million users, including email addresses, login information and more.
Jason Lobell, the new Chief Technology Officer (CTO) at Cyber Defense Labs, has protected company operations from cyber threats and built and managed security operations centers on behalf of a range of multinational companies.
Security talks to Jann Yogman, who has written and produced comedy for Michael J. Fox, Dana Carvey and Conan O'Brien during his career. Yogman brought his comedy skills to Mimecast to help out with cybersecurity awareness training, structuring the program like seasons of a situation comedy, with actual comedic actors playing repeating characters.
Securing physical or digital assets are at the heart of reducing enterprise and business risks. Identity management solutions help enterprises verify a user’s identity and ensure that only authorized users access facilities, applications, systems or networks. Let’s explore a sampling of the latest identity management solutions.
John Kreul will oversee the operations and strategy of Jewelers Mutual Group's technology department as the insurance provider's Chief Information Officer.
Today’s security threat landscape necessitates that security leaders work on an ongoing, effective security awareness program, tackling the inherent challenge of employee participation.
A recent test of artificial intelligence (AI) designed to identify illegally trafficked animals and animal products in air cargo and baggage proved successful in over 70% of cases. The AI model represents a collaboration between Smiths Detections, Microsoft and the Heathrow Airport.
Unmanned aircraft can provide enterprise security teams with a number of potential use cases, including improving incident response, investigations and more.
With unmanned aircraft as a tool for their security teams, enterprise security can expand situational awareness, while making more effective use of a company’s human resources.
When it comes to insider threats and document protection, security leaders can take a few practical steps to mitigating both intentional and unintentional breaches.