The Port of Vancouver USA has partnered with the Maritime Transportation System Information Sharing and Analysis Center (MTS-ISAC) to launch the Lower Columbia River Maritime Information Exchange (LCR-MIX), hardening the port system against cyberattacks.
Managing third-party risk is integral to maintaining enterprise cybersecurity and supply chain security. Determining who in the enterprise is responsible for third-party vendor security can help reduce risk, according to NCC Group research.
Cybersecurity experts weigh in on the National Institute of Standards and Technology (NIST)'s updated guidelines for maintaining software supply chain security.
Despite advancements in cybersecurity practices, compromised passwords remain responsible for the vast majority of data breaches today. Using zero knowledge password proof (ZKPP) may help organizational password security.
Critical infrastructure industries, especially those in the manufacturing, logistics and oil and gas sectors, have recently faced high-profile cyberattacks. How and why are these sectors targeted, and what can cybersecurity professionals do to secure their organizations?
Two standards from the International Electrotechnical Commission (IEC) can help cybersecurity professionals choose the best strategies in securing their industrial control systems.
John Kreul will oversee the operations and strategy of Jewelers Mutual Group's technology department as the insurance provider's Chief Information Officer.
Where does the responsibility for code vulnerabilities lie, and how can cybersecurity leaders address these vulnerabilities? Find tools for determining the security of code and mitigating cyber risk in your organization.
In the Leadership Keynote speech at the Security Industry Association (SIA) Securing New Ground conference, Intel Vice President and General Manager for Client Security Strategy and Initiatives Tom Garrison outlined how and why supply chain security needs to be seen as both a physical and cybersecurity priority.