This will come as no surprise to those involved in cybersecurity recruitment. The solution to the cybersecurity workforce shortage? Lowering the barrier to entry level cyber positions.
There is no one-size-fits-all approach to guiding a security program through a major transformation, but here are four things to consider to future-proof your enterprise.
This issue presents Security magazine’s 2022 Security Benchmark Report; let’s dive deeper into the security performance metrics that are most impactful to security leaders’ organizations.
Dropbox has disclosed a security breach after threat actors stole 130 code repositories from one of its GitHub accounts using employee credentials stolen in a phishing attack.
At any given time, data retention laws may be added or altered, so Chief Data Officers (CDOs) need to stay current with retention laws to ensure compliance.
The best strategy to keeping cyber insurance premiums manageable is to implement effective cybersecurity hygiene and data protection practices to protect your enterprise.
Gerhard Eschelbeck, Google's former Chief Information Security Officer (CISO) and Vice President of Security and Privacy Engineering, has been named CISO at Kodiak Robotics, Inc, a self-driving trucking company.
IT auditors’ lack of hands-on skill in information technology influences data breach likelihood and technical evidence interpretation for critical infrastructure, according to The Next Generation Cybersecurity Auditorstudy.