CISOs Weigh In On Managing Digital Transformation Risk

| | Reports
Around the world, companies in every industry are executing digital transformation initiatives to accelerate the pace of innovation, gain a leg up on the competition and improve business performance. As part of ...
Research: Email remains a weak link in U.S. election infrastructure

Research: Email remains a weak link in U.S. election infrastructure

As we head into the 2020 election season in the United States, a key component of the U.S. election infrastructure remains vulnerable to attack. Only 5% of the country’s largest counties are ...

More on Law Enforcement Backdoor Demands

The Carnegie Endowment for International Peace and Princeton University's Center for Information Technology Policy convened an Encryption Working Group to attempt progress on the "going dark" debate. They have released their report: ...
The Cyber Kill Chain

Are You Spending in the Right Places to Break the Cyber Kill Chain?

The shift that organizations are undergoing as they move customer and citizen data online, push new services, create new ways to interact, and improve supply chain efficiencies is one of the most ...
SANS and Siemplify Webinar - Next Generation Analysts for Next Generation Threats

Introducing The Road to Security Operations Maturity: A Cyentia Institute Research Report

If you compare two companies that are similar in all of the key ways – size, industry, revenue – what... The post Introducing The Road to Security Operations Maturity: A Cyentia Institute ...

Where Security Accountability Stops and Starts in the Public Cloud

| | Reports
For years, security was cited as a prime reason not to put sensitive data or valuable workloads into the public cloud. It’s safe to say that situation has changed. In fact, the ...

Computers and Video Surveillance

It used to be that surveillance cameras were passive. Maybe they just recorded, and no one looked at the video unless they needed to. Maybe a bored guard watched a dozen different ...

New Gartner Report Made Available by CyberArk: Best Practices for Privileged Access Management Through the Four Pillars of PAM

| | DEVOPS, Reports
Security and risk management leaders recognize that disruption begins with privileged access, since it allows external attackers and malicious insiders to control organization resources, disable security systems and access vast amounts of ...

GitHub Repositories Leak Thousands of Secrets, Study Shows

In case you were ever in doubt about how well users are protecting credentials in GitHub repositories and other code repositories, researchers at North Carolina State University recently discovered many thousands of ...

GitHub Repositories Leak Thousands of Secrets, Study Shows

In case you were ever in doubt about how well users are protecting credentials in GitHub repositories and other code repositories, researchers at North Carolina State University recently discovered many thousands of ...