The Port of Vancouver USA has partnered with the Maritime Transportation System Information Sharing and Analysis Center (MTS-ISAC) to launch the Lower Columbia River Maritime Information Exchange (LCR-MIX), hardening the port system against cyberattacks.
What are the tools and processes necessary to develop a comprehensive security program into a mature vulnerability assessment and risk management program?
There are several reasons an organization should look to become HITRUST certified: improved competitive advantage, cybersecurity, risk management and more.
Simplify and consolidate. Embracing this approach will do more than strengthen security postures — it will help decrease burnout, prevent data breaches and more.
Five years after the WannaCry ransomware attack, ransomware continues to be one of the most significant cybersecurity threats facing enterprises in 2022.
Emotet has become the most common malware family detected in Q1 2022 (representing 9% of all malware captured), according to a new HP Wolf security report.
Security talked to cybersecurity leaders to gauge their feelings on how the SolarWinds lawsuit will have ramifications for both security leaders and organizations going forward.