5G is here and redefining network architecture. Taking responsibility for its advancement in a secure manner has never been more important. Who ultimately is responsible for its associated security?
David Zambri brings 28 years of law enforcement experience to his new role at the University of Central Florida, where he previously served as Deputy Chief of Police.
As the United States continues to face attacks across critical sectors —
energy and infrastructure, healthcare, and operational technology (OT) —
a cultural shift in cybersecurity is taking place.
Dr. Kelly Fletcher, Performing the Duties of the Department of Defense (DoD) Chief Information Officer, talks about the department's cybersecurity priorities in a rapidly changing technology landscape.
Operation GhostShell, a highly targeted cyber espionage campaign, attacks the aerospace and telecommunications industries mainly in the Middle East, with additional victims in the U.S., Russia and Europe.
The “Ransom Disclosure Act would require ransomware victims to disclose ransom payments within 48 hours of payment — including the amount of ransom demanded and paid the type of currency used for payment of the ransom, and any known information about the entity demanding the ransom.
Despite the flurry of cyberattacks, an Untangle report finds that SMBs are expanding and embracing new work environments and investing in and investigating new technologies to secure their business.
In his new role as Chief Information Security Officer (CISO) at JLL, Joe Silva will oversee information security policies and threat management, among other responsibilities.
Dark data — masses of unstructured emails, social media posts, documents, photos and more — has bogged down companies for decades, yet it oftentimes remains overlooked. Extracting and eradicating non-value dark data will help make your organization less exposed to risks and liability in the event of a breach.