To prevent damage from phishing attacks, organizations need to take a few simple but important steps to improve their email security posture. Follow these six strategies, and your email infrastructure will be far safer from phishing and business email compromise (BEC).
What is the impact of cybersecurity compliance in this new age of accelerating regulation, pandemic-driven communications and as business processes move to the cloud?
A new Kudelski Security report provides insights and recommendations to help organizations address recruiting, retaining and developing the next generation of security leaders.
Eindhoven University of Technology researcher Björn Ruytenberg revealed the details of a new attack method he's calling Thunderspy - which targets devices with a Thunderbolt port.
As companies throughout the world turn to teleworking as a way of continuing operations in the face of COVID-19, employees and security teams alike have understandably faced growing pains in adjusting to this new reality. Here are five easy-to-follow tips that remote employees can follow to mitigate the risk of digital surveillance while working from home.
Kimberly Anstett has been appointed Executive Vice President and Chief Technology Officer (CTO) at Iron Mountain Incorporated, storage and information management services company enabling digital transformation.
TransUnion released its quarterly analysis of global online fraud trends, which found that the telecommunications, e-commerce and financial services industries have been increasingly impacted.
(ISC)² announced that the Certified Information Systems Security Professional (CISSP) certification has been found comparable to Level 7 of the Regulated Qualifications Framework (RQF) in the UK, denoting that the certification is comparable to Masters degree standard.