Loading...
The day's top cybersecurity news and in-depth coverage
October 21, 2020
Microsoft's CISO breaks down which four key areas to focus on to secure Windows networks: passwordless identity management, patch management, device control and benchmarks. Read more â¶
Over the past decade, CSOs have had more interaction with their boards of directors, becoming critical partners and driving risk management. Listen in as we share 6 guidelines for building board relationships, starting with inspiring confidence, which may be the most important thing a CSO can do.
Zoom, Microsoft Teams, Google Duo, Cisco Webex, FaceTime, Jitsi, Signal and WhatsApp. What does their encryption look like? What are the trade-offs?
Experts hope that indictments against six Russian military intelligence agents will make Russia rethink plans to disrupt the US election.
What is As-a-Service and consumption-based IT, and what does it mean for your business? How does it work, and how do you apply the consumption model to the full IT stack? This playbook answers these and many other questions about the As-a-Service model, including how to justify an investment in As-a-Service, important terms and concepts, and how to evaluate a provider. Youâll also learn about HPE GreenLake, which enables the same cloud experience everywhere â including in on-premises data centers, at the edge, and in multi-clouds. Read about how HPE GreenLake works, key benefits, FAQs, and â perhaps most important â potential ROI for your enterprise.
Ambiguities in a growing list of US reporting requirements keep CISOs up at night: Will they be compelled to report every breach even if they can prove the data was untouched? Experts advise on how to avoid trouble.
Attackers are taking advantage of the increased use of QR codes to steal sensitive information or conduct phishing campaigns. Here's what security teams and employees need to know.
More data and applications are moving to the cloud, which creates unique infosecurity challenges. Here are the "Egregious 11," the top security threats organizations face when using cloud services.
© 2024