As Chief Security Officer, Kirk McClain will lead the AFS Security & Intelligence Directorate, overseeing corporate risk and compliance with security policies and requirements.
Insider threats are particularly insidious because the risk is mostly unseen. But is it possible to know from their behaviors if someone is about to go rogue?
The time has come for cybersecurity strategy to evolve from being technology-centric to people-centric. Here are five key steps to achieve this strategy.
Hospitals and health systems can implement four cybersecurity best practices to adopt a security-first mindset and enhance resiliency and security posture, according to a Fortified Health Security report.
As cybersecurity leaders evaluate the risks that their organizations face, they must account for the risk that stress and anxiety on workers presents in an industry that never sleeps.
The Cyber Safety Review Board considers Log4j as an "endemic vulnerability," and provides actionable recommendations for organizations to strengthen cyber resilience and advance the public-private partnership for collective security.
The House of Representatives has passed the Quantum Computing Cybersecurity Preparedness Act, which would help ensure data protection and strengthen national security.
What are four key changes between ISO 27002:2013 and ISO 27002:2022? Find out here to ensure your organization can continue to meet top information security standards.
With so many potential vulnerabilities and evolving attack vectors, beating ransomware requires a multi-faceted ransomware prevention strategy, including cybersecurity technologies, data protection and orchestrated recovery, and security processes.
Let's explore common privilege escalation attack techniques and tactics used by attackers and how organizations can implement six security strategies to protect against these cyberattacks.