This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Cybersecurity leader Simon Scully brings his security monitoring and vulnerability management experience to his Vice President and Chief Information Security Officer roles at Venerable.
According to a new survey, security operations center (SOC) and security teams are suffering from high levels of stress outside of the working day—with alert overload a prime culprit.
Apple has released security updates to address a iOS zero-day vulnerability in multiple products. According to the Cybersecurity and Infrastructure Security Agency (CISA), an attacker could exploit some of these vulnerabilities to take control of an affected device.
Deepfakes, either as videos or audio recordings, are the next iteration of advanced impersonation techniques that bad actors can use to abuse trust and manipulate people into complying with their requests.
If enterprise security continues to mature as a business function, in most enterprises, senior management will ask for a set of metrics to measure performance.
January 1, 2020
What is the point of spending time, resources and money on your security program if you can't tell whether it's working or not? It's just as important to establish the right metrics for a security program as it is to have such a program in the first place.
ON DEMAND: The threat environment in commercial real estate has changed dramatically over the past 10 years, including the real threat of pandemics, active shooters, explosive devices, extreme weather and natural disasters, among other significant threats to commercial facilities.