70% of CISOs feel vulnerable to a material cyberattack in 2024 Security Staff May 28, 2024 A report surveyed 1,600 CISOs worldwide in order to shed light on their experiences, insights and predictions. Read More
Thriving in 2030: The future of compliance and risk management Travis Howerton May 27, 2024 In 2030, organizations of all sizes must expect the technology landscape to be dramatically different — but preparation must happen now. Read More
Security leaders are facing a new wave of identity risks Security Staff May 24, 2024 A study has found that increased technological and organizational complexity is contributing to new identity risks that security leaders must manage. Read More
Understand candidate screening data sources Susie Thomson May 23, 2024 All recruitment screening agencies are not equal, so look before you leap. Read More
The last six months shows a 341% increase in malicious emails Security Staff May 22, 2024 There has been an increase in malicious emails, including a rise in BEC, phishing and other message-based attacks driven by generative AI. Read More
5 Minutes With Challenges and opportunities that AI presents CISOs Jordyn Alger May 22, 2024 The artificial intelligence landscape is constantly shifting, presenting unique challenges and opportunities for CISOs. Read More
Financial consequences of ignoring security debt in 2024 Eitan Worcel May 21, 2024 What might have once seemed like an unavoidable security debt is now leaving vulnerabilities open to exploitation and manipulation.Read More
Consolidation is coming to corporate security technology Manish Mehta May 21, 2024 Technology within the corporate security industry is ripe for consolidation and a better way to operate.Read More
Top 5 things CISOs should know to protect their business Dan Rasmussen May 20, 2024 Security leaders should consider these five things that can help them protect the business.Read More
Cyber attribution: Do you really need to know? Nissim Ben Saadon May 17, 2024 Cyber attribution — finding exactly who perpetrated a given cyberattack — has seemingly become a cybersecurity goal in and of itself. But do organizations really need to know?Read More