Mira LaCous, Chief Technology Officer of the biometrics-led identity access management provider, BIO-key International, talks to Security magazine about current trends in biometric security.
In a Twitter poll that garnered close to 9000 responses, 79% of respondents say organizations shouldn't pay ransom when hit with a ransomware cyberattack.
(ISC)² – nonprofit association of certified cybersecurity professionals – announced that its healthcare security and cloud security certifications have been approved by the U.S. Department of Defense (DoD) as prerequisites of employment for certain security workforce categories.
Armis research found that end users are not paying attention to the major cybersecurity attacks plaguing operational technology and critical infrastructure across the country, signaling the importance of businesses prioritizing a focus on security as employees return to the office.
Good security hygiene practices go a long way to mitigating risk day in and day out. But security teams also need the flexibility to reorient themselves, so that when new threats emerge or new best practices or technologies become available, they can adapt.
Is your data truly safe when you move to the cloud? The recent fire at the OVHcloud’s data center in France proves that it is not. Here are four ways to keep your data safe, even when disaster strikes your cloud provider.
Gunter Ollmann has been named Chief Security Officer (CSO) at Devo Technology. Ollmann will drive Devo’s overall security strategy, Devo’s threat research teams, and ensure the company's security innovation.
D3FEND, a framework for cybersecurity professionals to tailor defenses against specific cyber threats is now available through MITRE. The National Security Agency funded MITRE’s research for D3FEND to improve the cybersecurity of National Security Systems, the Department of Defense, and the Defense Industrial Base.
This month’s entertaining podcast takes place back in-person from a pub in the U.K, with a wide-ranging conversation covering America’s potentially myopic focus on Russia; the Colonial Pipeline hack and ransomware; as well as cryptocurrency and traceability.
iland released the findings of its research into organizations’ disaster recovery readiness. The study found that as organizations work diligently to support evolving business needs, the majority of disaster recovery solutions are not tested on a regular basis.