Cybersecurity 'Nutrition' Labels Still a Work in Progress Pretty much every aspect of the effort to create easy-to-understand labels for Internet-of-Things (IoT) products is up in the air, according to participants in the process.
Cyberwar and Cybercrime Go Hand in Hand The line between criminal and political aims has become blurred, but motivations matter less than the effects of a breach.
Understanding the Rise of Risk-Based Vulnerability Management Risk-based vulnerability management solutions foster the convergence of risk management and vulnerability management. Andrew Braunberg explains what’s driving the emergence of RBVM.
How US Businesses Suffer From the Lack of Personal Data Privacy Laws The stalling of federal legislation and the continued expansion of data brokers are fueling a phishing epidemic.
Confidence in Data Recovery Tools Low IT practitioners are developing ransomware response plans, but many of them are not confident in their data resiliency tools.
Okta Launches New Workforce Identity Cloud Okta Worforce Identity Cloud has all three identity functions – identity access management, identity governance, and privilege access management – under the hood.
How Does DNS Telemetry Help Detect and Stop Threats? Administrators and security teams who have lost visibility into their own networks can use DNS telemetry to home in on anomalous traffic.