Top

Digital transformation and the shift to hybrid working triggered a rapid rise in the use of APIs. Now, the associated risks are under the spotlight

In this episode of the Business of InfoSec Podcast TrueBlue CISO and SVP Karen Holmes explains why she is putting automation and orchestration at the heart of her firm’s cybersecurity strategy

In this discussion from CISO Champions Live, US, our panel of experts discusses how to mitigate the risks associated with a ransomware attack

To mark cybersecurity awareness month we asked leading CISOs about how they are communicating cybersecurity risk to their colleagues both up and down the org chart

Ransomware has become a successful service-based business model, what follows is diversification, innovation, and growth warns BNP Paribas Group Head of Cyber Risk Intelligence Jules Pagna Disso When AIDS researcher Joseph Popp sent 20,000 floppy disks infected with rudimentary ransomware to

Assess your vendors, monitor for changes and pursue mutual transparency, advises Ryan Mayika from OneTrust, otherwise you burden your business with unnecessary risk

Nigel Stanley, Director of Cybersecurity at Jacobs, has a warning for CISOs: treating operational technology like information technology is more likely to break a system than secure it The risk of cyber attacks on factories, hospitals and vital infrastructure is

Ahead of his appearance at CISO Online ANZ, ThycoticCentrify’s Chief Security Scientist Joe Carson shares some key findings from a new report on risky employee behaviours from a cybersecurity perspective Cybersecurity software provider ThycoticCentrify has produced a new global report highlighting

CISO and author George Finney explains why neuroscience and psychology are powerful weapons in the fight against cybercrime

Loading