A new study examining the key challenges impacting IT audit professionals as they navigate an evolving risk landscape in an…
Cyber security firm Proofpoint has released its latest report in collaboration with the Economist Intelligence Unit, which has found that…
So helpful at disclosing credentials, even when you ask it not to It’s not every day you come across an…
There is a fog settling across the general populace, the civic space, due to lack of situational understanding and the…
NIST invites comments on Draft Special Publication (SP) 800-57 Part 1 Revision 5, Recommendation for Key Management: Part 1 – General. This…
As cybercriminals continue to become more sophisticated and prolific, one of the key weapons in their arsenal is automation, letting…
Palo Alto Networks has announced new enhancements to its comprehensive Security Orchestration, Automation, and Response (SOAR) platform, Demisto. Demisto v5.0…
Industry’s first-ever fixed cost licensing model means businesses don’t have to sacrifice security because of cost unpredictability LogRhythm has released…
An Implementation Guide for the Cybersecurity Framework (CSF) Manufacturing Profile Low Impact Level has been developed for manufacturers managing cybersecurity…
BlackBerry Limited has announced the creation of BlackBerry Advanced Technology Development Labs (BlackBerry Labs), a new business unit operating at…