Check out five tips on how to execute a successful ransomware tabletop exercise, including how to identify key participants and ensure representatives from core business and operations teams are involved.
If hackers can learn the ins and outs of your network, shouldn’t you beat them to the punch by obtaining deeper visibility and holistic mapping of your network infrastructure and attached applications, services, and devices?
Devo Technology announced the results of its 3rd annual SOC Performance Report (SPR), a survey on the current state of security operations center (SOC) performance.
The Cybersecurity and Infrastructure Security Agency (CISA) will be hosting the final Chemical Security Seminar of 2021 on December 15, featuring panel discussions on supply chain disruptions, emergency management collaboration, and a workshop to assist chemical industry members in designing their own chemical security exercises.
Compromised passwords led to many data breaches in 2021, a record-breaking year for cyber vulnerabilities. Dashlane compiled the sixth annual "Worst Password Offenders" list, which highlights high-profile cyber incidents.
A study from AdvisorSmith ranked sectors by their cost of cyber insurance. Organizations in the financial industry reported the highest cyber insurance expenses.
Threat actors are actively exploiting a critical security flaw in Java logging library Apache Log4j. Log4j is an open-source, Java-based logging utility widely used by enterprise applications and cloud services, meaning many organizations are at risk from threat actors actively exploiting this vulnerability.
National Cyber Resilience Centre Group (NCRCG) is comprised of government and corporate entities working together to ensure cybersecurity across the United Kingdom.
The information technology (IT) and communications sector was the most targeted by cyberattacks in 2021, according to data from Darktrace. This marks a shift from 2020, when the financial and insurance sector underwent the highest cyberattack volume.