Justin Grudzien says that he sees burnout among his peers in the industry and a lot of it has to do with the pressure that security...
Kroll, provider of services and digital products related to governance, risk and transparency, has announced that the firm has promoted 18 colleagues to the managing director level in the...
Billions of searches take place on the surface web every day. Synonymous with Google, this part of the web is indexed by search engines. Try searching...
CISA has issued supplemental direction to Emergency Directive (ED) 21-02: Mitigate Microsoft Exchange On-Premises Product Vulnerabilities providing additional forensic triage and server hardening, requirements for federal agencies. Specifically,...
Survey finds that 58% of respondents are concerned about security in the cloud, while misconfigurations are one of the leading causes of breaches and outages, as...
Cyberbit,announced the Hudson’s Bay Company incident response team as winner of the inaugural International Cyber League (ICL) competition, the America’s Cyber Cup, outperforming nearly 100 Security Operations Center...
You’ve just been hired to lead the security program of a prominent multinational organization. You’re provided a seasoned team and budget, but you can’t help looking...
The sudden shift to remote work exposed the limitations of traditional, domain-based security. The castle-and-moat security approach is obsolete, having given way to a kitchen-table-and-home-office norm....
We’ve all heard the warnings, “it’s not a matter of IF you’ll suffer a cyberattack, it’s WHEN.” Yet according to one study, more than 77% of...
How can consumers and retailers protect themselves in the coming months? Here, Jane Lee, Trust and Safety Architect at Sift, speaks to Security magazine about this critical issue. Security:...
Recent Comments