We cannot afford for social media to continue being an insider threat blind spot. The fallout from not properly managing and mitigating digital risk can result in irreparable damage to both individuals and organizations alike.
The most successful model for Kubernetes security will be one built on zero trust, one that embraces ephemeral JIT privileges, strong secrets governance and ZSP.
Enterprise organizations are concerned with the cybersecurity threat of dark data, according to a recent security report, "Understanding Risk: The Dark Side of Data" from Donnelley Financial Solutions.
Nearly two-thirds of small to mid-sized businesses experienced a cyberattack in the last 12 months, according to cybersecurity research from Devolutions.
A number of U.S. airport websites were temporarily taken offline after three pro-Russia cybercrime groups announced a wave of DDoS attacks targeting U.S. critical infrastructure.
Legato Security integrated their video wall technology into their security operations center (SOC) to improve incident response and data visualization with a solution from Haivision.
National security and cybersecurity lawyer John P. Carlin has been named the new Co-Head of the Cybersecurity & Data Protection practice and as a Partner in Litigation at Paul, Weiss.