Security News

Healthcare CISOs and other security and privacy leaders must carefully assess HHS' proposed new rules designed to help prevent the blocking of health information sharing and consider how they...

A successful cyberattack is undoubtedly one of the most disruptive events an organization can experience. Whether it’s phishing, DDoS, ransomware or SQL injection, the incident often results in...

Some 90% of CISOs are confused about their role in securing a SaaS environment, according to an Oracle and KPMG report.

Increasing pressure, hefty workloads, and budgetary deficits have significant negative effects on CISOs worldwide, according to a Nominet report.

80 percent of IT business leaders anticipate a critical breach or successful cyberattack over the coming year, according to the Cyber Risk Index (CRI), a Trend Micro survey of more than 1,000 IT...

Capgemini commissioned IDC to produce a new piece of research, which reveals the increasing pressure on the Chief Information Security Officer to drive forward digital transformation – or risk...

Endpoint detection and response tools and other related security technologies are critical weapons for defending against cyberattacks, says Larry Whiteside, the new CISO at Greenway Health, an...

CISOs Must Clearly Demonstrate Their Value to the Business in Dollars and Cents If you’re the typical CISO or other level of information security officer, chances are this job description sounds...

Many companies eventually find themselves in the following situation: they’re growing, their technology, infrastructure and teams are expanding, perhaps a M&A is on the horizon, and the board is...

With the CISO at the table, organizations must focus on products, processes, and people to stay secure, according to the executive director of the National Cyber Security Alliance.