Securing the growing hybrid workplace presents exponential threat landscape
September 13, 2021
A new HP Inc. study highlights the tension between IT teams and employees working from home (WFH) that security leaders must resolve to secure the future of work.
Applying the Sun Tzu approach to cybersecurity gives organizations the awareness of what to look for, what vulnerabilities create the most risk and how to implement the appropriate incident response procedures.
The Unit 42 Threat Intelligence team discovered Azurescape - the first known cross-account container takeover in the public cloud affecting Azure Container Instances.
A critical security vulnerability has been disclosed in HAProxy that could result in unauthorized access to sensitive data and execution of arbitrary commands.
In this special episode of The Security Podcasts, our multimedia specialist Layan Dahhan sits down with Fred Burton to reflect on the 20 years since 9/11 and how enterprise security has changed for this special episode of The Security Podcasts.
Security risks to medical supplies, along with asset-tracking and other physical security systems can be safeguarded with a three-tiered security-by-design strategy.
There are three foundational pillars to fostering a cyber-engaged workforce: employee engagement, executive leadership engagement and peer network engagement.
As the United States commemorates the terrorist attacks that killed nearly 3,000 people, injured 10,000 more and changed the course of life for many on September 11, 2001, those in the industry reflect on the changes that have happened in the security profession since.