How security teams should respond to sophisticated ransomware attacks

How security teams should respond to sophisticated ransomware attacks

How security teams should respond to sophisticated ransomware attacks | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

The 5 pillars of cloud security for data storage

The 5 pillars of cloud security for data storage

The 5 pillars of cloud security for data storage | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

79% of organizations expect ransomware attacks this year

79% of organizations expect ransomware attacks this year

79% of organizations expect ransomware attacks this year | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

How small & medium-sized businesses can shore up cyber defenses

How small & medium-sized businesses can shore up cyber defenses

How small & medium-sized businesses can shore up cyber defenses | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

94% of businesses acknowledge a privacy skills gap despite training

94% of businesses acknowledge a privacy skills gap despite training

94% of businesses acknowledge a privacy skills gap despite training | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Strengthening infrastructure services security with cloud technology

Strengthening infrastructure services security with cloud technology

Strengthening infrastructure services security with cloud technology | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Board members, CISOs mismatched on cyber threats, new survey shows

Board members, CISOs mismatched on cyber threats, new survey shows

Data: Proofpoint; Note: Respondents could select multiple options; Chart: Axios Visuals Company boards are struggling to get on the same page with lead security executives on how susceptible their organizations are to cyberattacks, according to a new survey. Driving the news: Email security company Proofpoint and MIT Sloan School of Management’s cyber program released a survey Tuesday detailing how 600 board directors worldwide view the cyber threats facing their companies. The survey was conducted Aug….

Read More

Citing cyberthreats: Why we should be worried

Citing cyberthreats: Why we should be worried

Citing cyberthreats: Why we should be worried | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Best practices for securing voice networks

Best practices for securing voice networks

Best practices for securing voice networks | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Colonial Pipeline names Adam Tice Chief Information Security Officer

Colonial Pipeline names Adam Tice Chief Information Security Officer

Colonial Pipeline names Adam Tice Chief Information Security Officer | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More
1 2 3