Government leadership and those chartered with creating budgets could benefit from applying sound value-management practices when considering the cybersecurity budget process.
Agencies should be able to select and provision from a variety of cybersecurity services and capabilities to improve their overall effectiveness and efficiency.
Fixing vulnerabilities isn't just a job for your in-house development team and the giants of Silicon Valley. It's a job for all the developers of the third-party software components embedded in countless applications and services - from open-source, to commercial ...
As organizations such as Target have discovered, cyber attackers sometimes attack indirectly, through suppliers, contractors, and customers. But how can you ensure that third parties are keeping their own systems secure - and are not providing an avenue to compromise ...
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.