In this special episode of The Security Podcasts, our multimedia specialist Layan Dahhan sits down with Fred Burton to reflect on the 20 years since 9/11 and how enterprise security has changed for this special episode of The Security Podcasts.
If not secured, Active Directory is a true Achilles heel for enterprises and remains a factor in most cyberattacks today. Here's why you shouldn't overlook Active Directory protection.
There are three foundational pillars to fostering a cyber-engaged workforce: employee engagement, executive leadership engagement and peer network engagement.
Three in four organizations are currently utilizing a hybrid work model. Employers and employees alike feel this is the best path moving forward. However, only roughly one in five companies (21%) are fully confident their infrastructure security can support long-term remote work.
Devin Ertel has been appointed Chief Information Security Officer (CISO) at Menlo Security, where he will spearhead global efforts to reduce the company’s risk and security exposure.
While forensic tools are potent weapons in the cyber world, on their own, they’re not enough to overcome the challenge of data sets growing in complexity and volume. Enter artificial intelligence.
The Cybersecurity and Infrastructure Security Agency (CISA) released the Cloud Security Technical Reference Architecture (TRA) and Zero Trust Maturity Model for public comment.