CISOs Are Gaining C-Suite Swagger, but Has It Come With a Cost? The number of CISOs who report directly to the CEO is up sharply in recent years, but many still say it's not enough to secure adequate resources.
3 Use Cases for Third-Party API Security Third-party API security requires a tailored approach for different scenarios. Learn how to adapt your security strategy to outbound data flows, inbound traffic, and SaaS-to-SaaS interconnections.
LATEST FROM DR TECHNOLOGY
MITRE's Latest ATT&CK Simulations Tackle Cloud Defenses The MITRE framework's applied exercise provides defenders with critical feedback about how to detect and defend against common, but sophisticated, attacks.
War Game Pits China Against Taiwan in All-Out Cyberwar At Black Hat and DEF CON, cybersecurity experts were asked to game out how Taiwan could protect its communications and power infrastructure in case of invasion by China.