Special Report Jadee Hanson - Top Cybersecurity Leaders 2023 Chief Information Officer & Chief Information Security Officer, Code42 Laura Stepanek March 1, 2023 Jadee Hanson, CIO and CISO at Code42, takes a human-centric approach to insider risk management and cybersecurity best practices.Read More
Special Report James Edgar - Top Cybersecurity Leaders 2023 Senior Vice President and Chief Information Security Officer (CISO), FLEETCOR Madeline Lauver March 1, 2023 James Edgar, SVP and CISO at FLEETCOR, has matured cybersecurity programs by foregrounding compliance and instilling a culture of security across organizations.Read More
26.6 million login credentials obtained by cybercriminals since 2018 Security Staff February 28, 2023 Since 2018, five million people globally had data stolen. A study found that 26.6 million usernames and passwords were obtained by cybercriminals.Read More
Research predicts major cybersecurity workforce shifts in coming years Security Staff February 24, 2023 Analysts have predicted major cybersecurity workforce shifts. According to research, nearly half of cybersecurity leaders will change jobs by 2025.Read More
Fishing vessel cited for electrical hazards and poor sanitation Security Staff February 23, 2023 An Alaskan fishing vessel has been cited again by OSHA for improper sanitation, hazardous food and water storage and electrical hazards. Read More
NSA best home network practices Security Staff February 23, 2023 The NSA released a list of cybersecurity best practices designed to help teleworkers protect their home networks from malicious cyber actors. Read More
Feigning sickness is the most common romance scammer tactic Security Staff February 21, 2023 The FTC released data regarding the common lies sold by romance scammers, whose scams cost nearly 70,000 consumers $1.3 billion in 2022.Read More
Organizations fought an average of 29.3 attacks daily in late 2022 Security Staff February 15, 2023 2022 Radware threat analysis report defined DDoS attack profiles by gains in number, frequency, volume, power, duration and complexity. Read More
It's time to prepare for quantum computing’s impact on DNS security Peter Lowe February 14, 2023 When quantum computing makes its entrance, it could eviscerate online communications. Cybersecurity efforts to prevent quantum attacks can’t wait.Read More
A human-first approach to minimizing insider threats Dale Killinger February 10, 2023 With business security as a top concern, there are steps and considerations security leaders can take to protect financial and intellectual assets. Read More