Beyond Spreadsheets: No formula for excelling at risk

Explore the complexities of risk assessment in the realm of cybersecurity with insights from the Edinburgh Security Leaders gathering. From navigating asset discovery challenges to addressing the human factor in ownership, discover ...

CISA Mitigation Guide for Healthcare Organizations: Part One

Build your cybersecurity strategy on a solid foundation of asset visibility and segmentation On November 20, 2023, the Cybersecurity Infrastructure and Security Agency (CISA) issued guidance for healthcare delivery organizations (HDOs) struggling ...
BOD 23-01: Shedding Light on Federal Enterprise Asset Visibility

BOD 23-01: Shedding Light on Federal Enterprise Asset Visibility

Binding Operational Directive 23-01 can help close a government security gap   The Cybersecurity & Infrastructure Security Agency (CISA) recently issued an advisory on a dozen new exploits and vulnerabilities affecting industrial ...
trade-offs, users, deception devices Cato Networks BYOD tablet Mobile Devices for GDPR Compliance

Refurbished Security Devices: Mistaken Identity or Deception?

Buying refurbished devices is not uncommon. Online marketplaces, such as eBay, offer a platform for customers to purchase second-hand gadgets at a lower price than the original, but at a higher quality ...
Security Boulevard

Secure Guardrails