The unrelenting pace of cyberattacks shows no signs of abating. Google and Microsoft have pledged billions of dollars to mitigate cyberattacks. The Biden Administration has made...
Heath Anderson, Director of Information Security and Technology at LogicGate, discusses how to build business and operational resiliency with a governance, risk management and compliance (GRC) program....
Despite its guiding force for most enterprise’s security initiatives, today’s approach to governance, risk and compliance (GRC) is still primarily a manual process. While a necessity—driven...
Device Centric Risk Management (DCRM) is a layered approach to cybersecurity that protects each device, driving remediation and mitigation directly on medical and IoT assets. To find out...
Veritas Technologies revealed new research that highlights the dangers of mis-using instant messaging (IM) and business collaboration tools: 71% of office workers globally – including 68%...
Threat actors have successfully targeted defense contractors over the years because they haven’t fully secured their networks, thus creating serious vulnerabilities in U.S. national security. To...
The pandemic tested corporations in 2020 like never before, and the fallout of the pandemic has sparked a host of additionally destructive risks: cybersecurity, supply chain,...
Recent Comments