As organizations shift to permanent hybrid work environments, security leaders must weigh the benefits and challenges of a Bring Your Own Device (BYOD) model.
The latest and greatest technology will not always protect a company. Instead, focus on the basics of cybersecurity: leadership, training and security monitoring, says Claudia Rast, Practice Department Chair for the IP, Cyber and Emerging Technology Group for Butzel Long.
The same Russian nation-state actor behind the cyberattacks targeting SolarWinds customers in 2020, Nobelium, has targeted organizations integral to the global IT supply chain.
Security leaders across the enterprise have been facing mounting pressures, including in the corporate boardroom. In particular, as mass remote environments and broadening threat landscapes increase, security executives must mitigate risk across a broader connected ecosystem than seen before.
Healthcare is disproportionately targeted: 34% of all data breaches in the U.S. involve a healthcare organization. Yes, healthcare is a large industry, but we’re not that large. Here’s why security is such an issue for our critically important but increasingly fragile industry.
Gigabyte Technology, a Taiwanese manufacturer and distributor of computer hardware, has allegedly suffered a massive data breach as a result of a ransomware attack.
When it comes to cyber incident management of third-party risks, enterprise security professionals can follow a simplified task list to cover their bases by answering the questions "who, what, where, when, why and how."