Though anticipating and preparing for the future is always smart business, there are some industries which take it a step beyond the norm. In cybersecurity, the concept of “future proofing” is essentially the modus operandi everyone adheres to considering just how quickly a massive breach can turn the tide on our collective defenses. By their very nature, security professionals are constantly preparing to head off new threats by diagnosing them and creating an active defense model that makes it nearly impossible - and absurdly expensive - for hackers to get at their data.
To prevent damage from phishing attacks, organizations need to take a few simple but important steps to improve their email security posture. Follow these six strategies, and your email infrastructure will be far safer from phishing and business email compromise (BEC).
What is the impact of cybersecurity compliance in this new age of accelerating regulation, pandemic-driven communications and as business processes move to the cloud?
A new Kudelski Security report provides insights and recommendations to help organizations address recruiting, retaining and developing the next generation of security leaders.
Eindhoven University of Technology researcher Björn Ruytenberg revealed the details of a new attack method he's calling Thunderspy - which targets devices with a Thunderbolt port.
As companies throughout the world turn to teleworking as a way of continuing operations in the face of COVID-19, employees and security teams alike have understandably faced growing pains in adjusting to this new reality. Here are five easy-to-follow tips that remote employees can follow to mitigate the risk of digital surveillance while working from home.