Security News

The technology industry has long been categorized by its ability to transform at the blink of an eye. If you think back 20 years, the internet was just picking up consumer momentum and now nearly...

Dan Patterson interviews Xerox CISO Alissa Abdullah about protecting sensitive data from adversaries. They also discuss the recent Marriott hack, privacy, ransomware, machine learning, and IoT.

We sat down with Aaron Contorer, CEO at FP Complete, to learn more about what enterprises can do to increase their cybersecurity, the challenges related to DevSecOps implementations and improving...

Cylance released its virtual chief information security officer (vCISO) service, a program designed to provide organizations with technology and security resources that support next-generation...

L&T Group CISO Uday Deshpande on Securing Operational TechnologyThe lack of standardization is one of the significant challenges when securing OT environments. Customizing and aligning OT security...

The vision of a standardized method to assess the risk management posture of third party suppliers to healthcare firms envisioned by the recently-formed Provider Third Party Risk Management...


Zane Lackey is the co-founder and CSO at Signal Sciences, and the author of Building a Modern Security Program (O’Reilly Media). He serves on multiple Advisory Boards including the National...

Anahi Santiago of Christiana Care on Patching, Mitigating Insider ThreatsA failure to patch systems and slipups that lead to insider threats are two major causes of breaches in the healthcare...

Responsibility for information security is not falling to any one senior executive function, according to the 2018 Risk:Value report from NTT Security, which surveyed 1,800 senior decision makers...