With the proliferation of ransomware attacks, every business feels the pressure—and often a sense of futility—in defending against cybercriminals. But companies can regain control by focusing...
Mobile telecommunication company T-Mobile has confirmed a data breach that reportedly affects nearly all of its U.S. customers. Hackers gained access to the company’s systems and...
Despite its guiding force for most enterprise’s security initiatives, today’s approach to governance, risk and compliance (GRC) is still primarily a manual process. While a necessity—driven...
The Cybersecurity and Infrastructure Security Agency (CISA) released a new downloadable Cybersecurity Workforce Training Guide to assist future and current cybersecurity and information technology (IT) professionals chart a successful career path. This guide is a one-stop-shop for information and resources...
The National Cyber Security Alliance, a leading nonprofit organization that focuses on driving cybersecurity behavior change, announced the launch of its Cybersecurity Education and Career Resource Library. Built...
Every day, swathes of global bad actors attempt to attack your critical company infrastructure. It’s a daunting proposition. What’s more, it can be challenging to know...
The increased threat posed by increasing ransomware attacks, including the latest Kaseya attack that impacted nearly 1,500 organizations, has forced the C-suite to think differently about...
By Eric Kedrosky Even in progressive organizations, network-based security practices still linger and they can lead to a dangerously flawed cloud strategy. The old model of...
In the past, passwords were the key to accessing systems and platforms, and they held much value as a security measure for businesses. But over time,...
Proofpoint, Inc. unveiled its annual Human Factor report, which provides a comprehensive examination of the three main facets of user risk—vulnerability, attacks, and privilege—and how the extraordinary events...
Recent Comments