This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
CISOs must prioritize vendor compliance to protect their company and patients from risk and avoid reputational damage, expensive penalties, and other financial impacts.
The risk of a cyberattack against healthcare organizations is growing rapidly, with some 83 percent of health CISOs reporting an increased number of attacks in the past year.
A five-year, $4.63 million award from the National Science Foundation will enable a multi-disciplinary team of researchers at the University of Arkansas to recruit, educate and train the next generation of cybersecurity professionals.
The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) announced $35 million in funding opportunities for a new DHS Center of Excellence (COE) for Terrorism Prevention and Counterterrorism Research (TPCR).
Transformation is defined as: “(noun) a change in form, appearance, nature or character.” Today, the physical security industry is faced with the fact that digital transformation has redefined business risk.
AT&T is the first wireless carrier to block robocalls after a recent Federal Communications Commission (FCC) ruling paved the way for cell phone carriers to do so.
For years, cybercriminals have used both the deep web and the dark web as clearing houses for consumer credit card numbers as well as other personal information