When making a security outsourcing decision, you not only have to trust that the company can competently do the work, but you have to trust that you can trust them. After all, you are handing them the ...
Faced with an unprecedented threat, federal agencies are looking to lock down the physical compute layer for additional cybersecurity assurance. Alexander Slagg is a freelance writer specializing in ...
As the role of higher education evolves, cybersecurity approaches must adapt. By collaboratively reexamining the cross-functional ecosystem that suppo ...
Software development lifecycles and well-known maturity models have traditionally defined the evolution and setup of security programs. There are various software development security frameworks and ...
Viewed as a copilot to augment rather than revolutionize security operations, well-governed AI can deliver incremental results, according to security leaders’ early returns. Applying artificial ...
Many readers responded to the recent newsletter on multi-function security boxes that support VPNs, and raised new issues. Redundancy was brought up over and over. If a single device performs many ...
With the increasing use of mobile devices, malware targeting smartphones and tablets has become more prevalent. Banking Trojans, in particular, are designed to steal banking credentials and financial ...