Security News

Here’s an overview of some of last week’s most interesting news and articles: Cybersecurity and ethical data management: Getting it right Laura Norén, director of research at Obsidian Security and...

Data can provide information, information can lead to insight and knowledge, and knowledge is power. It’s no wonder, then, that seemingly everybody in this modern, computerized world of ours loves...

Axio launched its new NIST-CSF risk management platform. Built by security and insurance execs, Axio’s plaform measures cyber program maturity using the NIST Cybersecurity Framework, establishes a...

Sarb Sembhi of Virtually Informed on Critical Steps to TakeMany of the devices that go into so-called smart cities and buildings are not built to be secure, making it difficult for security...

CyberGRX unveiled an open online community dedicated to increasing cross organizational collaboration between risk professionals and IT teams who are struggling with the inefficiencies created by...

Many individuals struggle with organizing their day-to-day work. In instances where they are expected to perform many disparate tasks, disorganization could end up being fatal for their job and...

HITRUST is releasing its Threat Catalogue to provide organizations with visibility into the threats and risks targeting their information, assets and operations. In addition to helping...

A user identity management system can help improve visibility of data residing in the cloud and improve security, says Deepen Desai, a vice president at Zscaler, a cloud-based information security company.

Organizations must carefully monitor that their business associates are adequately addressing data security to help guard against breaches, says Mark Eggleston, CISO at Health Partners Plans, who...

A10 Networks launched advancements to its Thunder Application Delivery Controllers (ADCs) with Harmony Controller support for centralized, multi-cloud management, per-app analytics and DevOps tool...