The January 2020 compromise did not succeed but highlighted significant deficiencies in the security operations of the federal agency tasked with an accurate count of the population.
Good digital identity must be secure and unique, verified with high assurance, and privacy-preserving, along with individual user control and embedded consent.
Even as organizations diversify their IT environments, adding more cloud storage, the mainframe plays a critical role. Here are four key strategies for locking down the mainframe to secure the core of your business.
Don't believe these myths surrounding CMMC compliance. Here's what organizations really need to know in order to work with the US Department of Defense.
Cultivating a diverse cybersecurity workforce requires a multipronged approach. Here are key steps organizations can take to increase diversity and grow the cybersecurity talent pipeline.
Almost three-quarters of Web applications for businesses that handle accounting, auditing, finances, and operations have critical vulnerabilities every day of the year.
Researchers who investigated the privately sold malware platform find a new controller -- and new implications for the Chinese espionage threat landscape.
Enterprises have to decide whether to take into account the security of end-customers' devices when building out the application experience, or even whether the application allows or denies access depending on the device.
In this webinar, Roger Grimes, KnowBe4's Data-Driven Defense Evangelist, will teach you how to enable DMARC, SPF, DKIM the right way. You'll also discover six reasons why phishing still might get through to your inbox and what you can ...
In this webinar, experts offer advice on how to effectively use third-party service providers, how to choose a provider that fits your requirements, and how to ensure the third-party provider is meeting your security requirements.
As the COVID-19 pandemic eases, IT security threats and the challenges involved in responding to them are trending upward. Security leaders expect that cyberattacks like ransomware, phishing, and malware will increase even as the pandemic eventually recedes. Download the Dark ...
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.