CISA released a Notice of Funding Opportunity (NOFO) to fund up to two demonstration projects that address the National Emergency Communications Plan and identify innovative solutions to improve the delivery of rural medical communications.
Though anticipating and preparing for the future is always smart business, there are some industries which take it a step beyond the norm. In cybersecurity, the concept of “future proofing” is essentially the modus operandi everyone adheres to considering just how quickly a massive breach can turn the tide on our collective defenses. By their very nature, security professionals are constantly preparing to head off new threats by diagnosing them and creating an active defense model that makes it nearly impossible - and absurdly expensive - for hackers to get at their data.
To prevent damage from phishing attacks, organizations need to take a few simple but important steps to improve their email security posture. Follow these six strategies, and your email infrastructure will be far safer from phishing and business email compromise (BEC).
What is the impact of cybersecurity compliance in this new age of accelerating regulation, pandemic-driven communications and as business processes move to the cloud?
A new Kudelski Security report provides insights and recommendations to help organizations address recruiting, retaining and developing the next generation of security leaders.
Eindhoven University of Technology researcher Björn Ruytenberg revealed the details of a new attack method he's calling Thunderspy - which targets devices with a Thunderbolt port.