This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
By relying on untargeted, lengthy, and vague exercises that aren’t aligned with real-world or relevant situations, businesses risk having their security awareness efforts do more harm than good.
Shifting to a remote environment may have benefitted businesses, but not without introducing new cybersecurity risks. A data-backed strategy can help security leaders manage those risks.
The National Governors Association (NGA) selected seven states — Colorado, Michigan, Mississippi, New York, Oregon, Pennsylvania and Tennessee — to participate in a new project focused on implementing best practices on advancing statewide cybersecurity.
Cybersecurity researchers at the Georgia Institute of Technology have developed a new form of ransomware that was able to take over control of a simulated water treatment plant.
Privacy issues have long been a big concern when it comes to cybersecurity, but with major security breaches like the one Target experienced in December 2013
In the event of a breach, you need to have a written plan to take immediate steps and know who is going to analyze the problem, who will notify the people impacted by the breach, and who you can call for help, among other things.