A new global report from Claroty details a number of potential contributing factors for today's CISOs to consider, including the convergence of IT and OT roles.
The Information Technology Laboratory (ITL), a component of the NIST Computer Resource Center, has issued a bulletin that reiterates NIST standards for teleworking.
Carnegie Mellon University announced it will offer a new master’s program in cybersecurity designed to address the growing need for IT security professionals in Washington D.C.
A five-phase strategic and systematic approach to strengthen the resilience of organizations’ current business models is key to business continuity during the coronavirus pandemic, according to Gartner, Inc.
Led by cybersecurity analysts Noam Rotem and Ran Locar, vpnMentor’s research team recently found a serious breach in an open Amazon S3 bucket owned by secure cloud storage provider Data Deposit Box.
The term “spoofing” might have a comic implication in some contexts, but it’s no joke when it comes to information security. In fact, this is a subject matter of a whole separate chapter in a seasoned cybercriminal’s handbook. It comprises a multitude of techniques aimed at camouflaging a malicious actor or device as somebody or something else. Out of all the nefarious scenarios that fit the mold of a spoofing attack, the following 11 types are growingly impactful for the enterprise these days.
United Natural Foods, Inc. (UNFI), a large grocery distributor in the U.S., announced that Jack Clare has been named its new Chief Information Officer.
As COVID-19 has prompted an unprecedented number of companies and government agencies worldwide to suddenly shift to a remote-work model, uncertainties abound.