This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Dropbox has disclosed a security breach after threat actors stole 130 code repositories from one of its GitHub accounts using employee credentials stolen in a phishing attack.
At any given time, data retention laws may be added or altered, so Chief Data Officers (CDOs) need to stay current with retention laws to ensure compliance.
The best strategy to keeping cyber insurance premiums manageable is to implement effective cybersecurity hygiene and data protection practices to protect your enterprise.
Security professionals need to prepare for the cyber and physical threats presented by the metaverse, including identity theft, bodily injury and more.
Gerhard Eschelbeck, Google's former Chief Information Security Officer (CISO) and Vice President of Security and Privacy Engineering, has been named CISO at Kodiak Robotics, Inc, a self-driving trucking company.
Netskope unveiled new research that shows how the prevalence of cloud applications is changing the way threat actors use phishing attack delivery methods to steal data.
In this podcast episode, cybersecurity professional Lisa Tetrault talks leveraging industry connections to break into the cyber field; the power of mentorship in cybersecurity; and more.
Organizations seeking cyber insurance coverage are required to prove their cybersecurity posture, disaster recovery and related risk and technology best practices.
Compromised mobile devices can present a cybersecurity threat to organizations. Here are 10 steps security teams can use to assess the risk level of a cell phone.