It’s imperative security leaders constantly prepare their organizations for future threats. Conveniently, many of these potential threats are explored in one TV show.
Conducting risk assessments are a valuable piece of any security program. But, in order to achieve maximum return, there’s a right and a wrong way to follow through.
Conducting risk assessments are a valuable piece of any security program. But, in order to achieve maximum return, there’s a right and a wrong way to follow through.
North Korean state-sponsored cyber threat actors have used Maui ransomware to target both the healthcare and public health sectors, according to U.S. cybersecurity alerts.
When dealing with security threats, financial fraud and risk, and a myriad of other business challenges, organizations should align on a cybersecurity strategy that includes risk assessments.
Google has released Chrome 103.0.5060.114 for Windows users to address a high-severity zero-day vulnerability exploited by attackers in the wild. The security vulnerability affected millions of Google Chrome users.
Unfortunately, a passwordless future isn’t here yet —
but in the meantime, organizations still need ways to protect their systems and employees from compromise.
Businesses need to evaluate how they manage their physical risks to avoid the next improbable event that could have devastating consequences to an organization’s continuity and bottom line.
Seasoned chief information officer Michael Lillie brings extensive information technology, information security and business strategy experience to his new role at OneSpan.