This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security professionals need to prepare for the cyber and physical threats presented by the metaverse, including identity theft, bodily injury and more.
Gerhard Eschelbeck, Google's former Chief Information Security Officer (CISO) and Vice President of Security and Privacy Engineering, has been named CISO at Kodiak Robotics, Inc, a self-driving trucking company.
Netskope unveiled new research that shows how the prevalence of cloud applications is changing the way threat actors use phishing attack delivery methods to steal data.
In this podcast episode, cybersecurity professional Lisa Tetrault talks leveraging industry connections to break into the cyber field; the power of mentorship in cybersecurity; and more.
Organizations seeking cyber insurance coverage are required to prove their cybersecurity posture, disaster recovery and related risk and technology best practices.
Compromised mobile devices can present a cybersecurity threat to organizations. Here are 10 steps security teams can use to assess the risk level of a cell phone.
According to a Netwrix report, 61% of respondents in the healthcare industry suffered a cyberattack on their cloud infrastructure within the last 12 months.
IT auditors’ lack of hands-on skill in information technology influences data breach likelihood and technical evidence interpretation for critical infrastructure, according to The Next Generation Cybersecurity Auditorstudy.
Organizations have significantly matured their security postures since last year in response to operational technology (OT) and industrial control systems (ICS) cybersecurity threats.