Modern breaches now happen in minutes, not months. Threat actors are exploiting the fact that mobile devices are more susceptible to social engineering, enabling them to gain direct access to cloud infrastructure with legitimate credentials and swiftly compromise data. Recent ...
Paul Nakasone. Timothy White. Stephen Davis. Jen Easterly. The quartet who drafted plans for US Cyber Command discussed their shared history in cyber defense. Read More
RSA Conference 2024 -- Cybersecurity leaders from Equifax and others who've responded to data breaches and cyber incidents, gave their best advice on crisis communications, general counsel, and good community. Read More
The renowned technologist and author details the good, bad, and ugly possibilities of artificial intelligence and its impact on everything from politics to law. Read More
Leaders of Homeland Security and CISA hold separate chats to share their stances and campaigns for US cyber resilience, including the Secure by Design campaign. Read More
InformationWeek c/o Informa Tech Holdings LLC | Registered in the United States with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA