Threat intelligence is only one piece of the puzzle when it comes to improving supply chain security. As part of protecting the supply chain and reducing third-party risk, here's how your organization should get started.
Fact is, security in the cloud needs improvement. The problem is that cloud service providers treat cloud security as a shared responsibility with their customers. And while cloud purveyors typically hold up their end of the bargain, many customers do not. Human error among cloud customers is rampant.
The insider threat is not a new risk for security teams. And, in the wake of COVID-19 and the newly remote workforce, there has never been a greater need for organizations to better balance their efforts to defend against both external and internal threats.
Mira LaCous, Chief Technology Officer of the biometrics-led identity access management provider, BIO-key International, talks to Security magazine about current trends in biometric security.
In a Twitter poll that garnered close to 9000 responses, 79% of respondents say organizations shouldn't pay ransom when hit with a ransomware cyberattack.
(ISC)² – nonprofit association of certified cybersecurity professionals – announced that its healthcare security and cloud security certifications have been approved by the U.S. Department of Defense (DoD) as prerequisites of employment for certain security workforce categories.
Armis research found that end users are not paying attention to the major cybersecurity attacks plaguing operational technology and critical infrastructure across the country, signaling the importance of businesses prioritizing a focus on security as employees return to the office.
Is your data truly safe when you move to the cloud? The recent fire at the OVHcloud’s data center in France proves that it is not. Here are four ways to keep your data safe, even when disaster strikes your cloud provider.
Gunter Ollmann has been named Chief Security Officer (CSO) at Devo Technology. Ollmann will drive Devo’s overall security strategy, Devo’s threat research teams, and ensure the company's security innovation.