Considerations for Managing Digital Sovereignty: The Executive Perspective
Businesses value the availability, scalability, and reliability of the cloud. They recognize that cloud computing can enable data to flow freely to where it needs Read More
Businesses value the availability, scalability, and reliability of the cloud. They recognize that cloud computing can enable data to flow freely to where it needs Read More
Kaspersky researchers have discovered that attackers are distributing spyware that stealthily gathers private data from users of WhatsApp on Android devices, through the same mods Read More
Question: How do I make sure the saying “security is everyone’s responsibility” doesn’t lead to people feeling like security is nobody’s responsibility? Lenny Zeltser, CISO Read More
If you’re not already using crisis simulations as a key part of incident preparation and response, it’s time to start stress-testing personnel and protocols to Read More
The infamous North Korean advanced persistent threat (APT) group Lazarus has developed a form of macOS malware called “KandyKorn,” which it is using to target Read More
HERSHEY, Pa. — The exploitation of zero-day vulnerabilities is on the rise globally and directly impacting federal agencies, part of what a senior Cybersecurity and Read More
Former National Security Agency Executive Director Harry Coker told members of the Senate Homeland Security and Governmental Affairs Committee that if he’s confirmed as the Read More
More than 100 teams of students from around the country on Saturday are taking on the role of an energy company defending itself from cyberattacks, Read More
Microsoft announced on Thursday that it will update security protections for signing keys after coming under criticism from policymakers that deficient security controls allowed Chinese Read More
The Persian Gulf has long had designs on leveraging technology to diversify its economies: All six regional states have drawn up no-holds-barred plans to put Read More