Rohinee Mohindroo brings cybersecurity experience to the Chief Information Officer (CIO) position at Sitecore from her roles at three other firms, where she helped design cyber strategies to best defend against threats.
Security professionals and enterprise leaders need to consider four key healthcare factors when planning business travel as the COVID-19 pandemic nears the end of its second year.
The Central Bank of the United Arab Emirates (CBUAE) has added a cybersecurity center to its security strategy. The CBUAE Networking and Cyber Security Operations Centre aims to mitigate cyber risk in the country's financial sector.
Controlling access to data within an organization is paramount to maintaining a secure cyber environment. Using identity governance strategies can help achieve this goal.
With a projected over $44 billion in revenue in 2021, the casino industry has become a target for cybercriminals, who attempt to attack both online betting systems and in-person machines. How can casinos protect themselves from cyber threats?
Where does the responsibility for code vulnerabilities lie, and how can cybersecurity leaders address these vulnerabilities? Find tools for determining the security of code and mitigating cyber risk in your organization.
By keeping a pulse on evolving threats and monitoring the entire environment, security leaders can mitigate their institutions’ cyber risk and keep networks, data and users secure.
A new survey on how information technology (IT) employees perceived their work environment revealed that 72% of IT professionals are considering leaving their jobs an looking for other opportunities within the next twelve months. Find out why here.
A cybersecurity leader with over 20 years of experience in the field, Michael Gregg will focus on end point protection, risk management and more as the State of North Dakota's new Chief Information Security Officer (CISO).
Within a diversified cybersecurity strategy, digital forensic analysis can ensure that organizations have the means to react in a timely manner and, more importantly, recover from a cyberattack.