94% of businesses acknowledge a privacy skills gap despite training

94% of businesses acknowledge a privacy skills gap despite training

94% of businesses acknowledge a privacy skills gap despite training | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Strengthening infrastructure services security with cloud technology

Strengthening infrastructure services security with cloud technology

Strengthening infrastructure services security with cloud technology | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Board members, CISOs mismatched on cyber threats, new survey shows

Board members, CISOs mismatched on cyber threats, new survey shows

Data: Proofpoint; Note: Respondents could select multiple options; Chart: Axios Visuals Company boards are struggling to get on the same page with lead security executives on how susceptible their organizations are to cyberattacks, according to a new survey. Driving the news: Email security company Proofpoint and MIT Sloan School of Management’s cyber program released a survey Tuesday detailing how 600 board directors worldwide view the cyber threats facing their companies. The survey was conducted Aug….

Read More

Citing cyberthreats: Why we should be worried

Citing cyberthreats: Why we should be worried

Citing cyberthreats: Why we should be worried | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Best practices for securing voice networks

Best practices for securing voice networks

Best practices for securing voice networks | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Colonial Pipeline names Adam Tice Chief Information Security Officer

Colonial Pipeline names Adam Tice Chief Information Security Officer

Colonial Pipeline names Adam Tice Chief Information Security Officer | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Even the most experienced cyber professionals agree: We can’t prevent all breaches

Even the most experienced cyber professionals agree: We can’t prevent all breaches

Even the most experienced cyber professionals agree: We can’t prevent all breaches | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

5 minutes with AJ Samuel – Why legal teams must quarterback data breach responses

5 minutes with AJ Samuel – Why legal teams must quarterback data breach responses

5 minutes with AJ Samuel – Why legal teams must quarterback data breach responses | 2021-04-28 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and…

Read More

Same cyber threats, better solutions as impact of data breaches skyrocketed in 2020

Same cyber threats, better solutions as impact of data breaches skyrocketed in 2020

Same cyber threats, better solutions as impact of data breaches skyrocketed in 2020 | 2021-03-01 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie…

Read More

It’s time to rethink cybersecurity training… Again

It’s time to rethink cybersecurity training… Again

It’s time to rethink cybersecurity training… Again | 2021-02-04 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More
1 2 3