To develop a strong cyber defense, management needs to have a high-level understanding of what their CISO and IT managers guard against daily.
The COVID-19 pandemic has forced both government and higher education to think more about remote data and other cybersecurity concerns.
Phishing tactics have steadily evolved, either in response to new defensive measures from security companies, increased awareness among users or a change in attackers’ priorities.
This is Part 3 of my Chief Information Security Officer’s 365-day journey. Read on to learn about the importance of continuous improvement and feedback.
Most organizations have between 20 and 75 security solutions, each solving a separate problem. While these tools can help fight specific cybersecurity threats, they often don’t integrate well with one another, creating visibility problems and complexity overload.
When you implement a smart card project, you must understand what abilities you really have. Don’t circumvent security for marketing hype.
In a world where data has grown about 430% in the past decade, can agencies secure their data goods and lower their risk effectively?
The fantasy of a single login with access to multiple public sector services isn’t so far-fetched, cybersecurity experts say.
A cybersecurity expert highlighted three methods that are key to ransomware protection: exploit blocking, machine learning and indicators of attack.
An industry cybersecurity expert gave agencies three pointers for protecting themselves with zero trust cybersecurity, which assumes everyone and everything on IT networks is potentially threatening.