At any given time, data retention laws may be added or altered, so Chief Data Officers (CDOs) need to stay current with retention laws to ensure compliance.
The best strategy to keeping cyber insurance premiums manageable is to implement effective cybersecurity hygiene and data protection practices to protect your enterprise.
Security professionals need to prepare for the cyber and physical threats presented by the metaverse, including identity theft, bodily injury and more.
Gerhard Eschelbeck, Google's former Chief Information Security Officer (CISO) and Vice President of Security and Privacy Engineering, has been named CISO at Kodiak Robotics, Inc, a self-driving trucking company.
Netskope unveiled new research that shows how the prevalence of cloud applications is changing the way threat actors use phishing attack delivery methods to steal data.
In this podcast episode, cybersecurity professional Lisa Tetrault talks leveraging industry connections to break into the cyber field; the power of mentorship in cybersecurity; and more.
Organizations seeking cyber insurance coverage are required to prove their cybersecurity posture, disaster recovery and related risk and technology best practices.
Compromised mobile devices can present a cybersecurity threat to organizations. Here are 10 steps security teams can use to assess the risk level of a cell phone.
According to a Netwrix report, 61% of respondents in the healthcare industry suffered a cyberattack on their cloud infrastructure within the last 12 months.