The Federal Emergency Management Agency wrongly released the personal information of 2.3 million survivors of devastating 2017 hurricanes and wildfires.
The World Wide Web Consortium (W3C) just approved the Web Authentication API, also known as WebAuthn, which is a new way to log into websites without passwords.
Cyberattacks and data breaches are inevitable, but a multifaceted security approach will limit the potential impact. A successful strategy will combine technology, processes and people.
CISO roles – both full-time and fractional – are on the rise. Their skills can help a growing organization enhance its security program, keep it on track, and guide in times of crisis and change. However, finding the right CISO can be tricky business, especially if this role is new to your organization. Here are the skills to look for when hiring your CISO.
Organizations are doing some fancy footwork with security these days in order to simultaneously protect users yet empower them to perform various tasks online. As application workloads and activities move to one or more cloud environments, organizations have also begun to ask what they should do to ensure proper cloud security.
The WannaCry ransomware attack that successfully targeted Merck is not the only cyberattack to which the pharmaceutical industry has fallen victim. As pharmaceutical and biotechnology companies move toward greater digitalization and the storage of more valuable data, their digital security practices become more and more critical.