6 CISO Takeaways From the NSA's Zero-Trust Guidance All companies — not just federal agencies — should aim to adopt the "network and environment" pillar of the National Security Agency's zero-trust guidelines.
10 Tips for Better Security Data Management CISOs must build out a security data management and security data architecture to get the most out of their security data for the least amount of investment.
LATEST FROM DR TECHNOLOGY
How to Ensure Open Source Packages Are Not Landmines CISA and OpenSSF jointly published new guidance recommending technical controls to make it harder for developers to bring malicious software components into code.
North Korea-Linked Group Levels Multistage Cyberattack on South Korea Kimsuky-attributed campaign uses eight steps to compromise systems — from initial execution to downloading additional code from Dropbox, and executing code to establish stealth and persistence.