Randolph Barr is a seasoned chief information security officer with more than two decades of experience in cybersecurity, IT, and risk management. He has led the development and expansion of security ...
Conclusion As organizations continue to onboard new vendors, supply chain and other third-party risks will continue to climb. By continuously evaluating and updating your organization's third-party ...
Cybersecurity risk has increased exponentially due to the changing and complex cyber-threat landscape, particularly ransomware attacks. As a result, cyber-insurance premiums have surged by 50% just in ...
Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Every week, we'll offer articles gleaned from across our ...
How do CEOs, their executive teams, and their HR partners attract the best of the market? Here are a few ways. 1. Level and structure the role appropriately: If security — of enterprise data, customer ...
Samsung Fails Consumers in Preventable Back-to-Back Data Breaches, According to Federal LawsuitSamsung Fails Consumers in Preventable Back-to-Back Data Breaches, According to Federal Lawsuit Company ...
Every year, more men and women enter cybersecurity, driven by the sector's explosive growth in response to increasingly sophisticated threats. In 2023, the global cybersecurity workforce hit 5.5 ...
Life on a security team can sure take its toll. Come up with a clever cybersecurity-related caption to explain the scene, above, and our favorite will win a $25 Amazon gift card.
Whether it's a CISO feeling the anxiety of potentially being an organizational scapegoat or a SOC analyst drowning in alerts, cybersecurity pros are constantly feeling the wear and tear of daily, ...
Someone did — or didn't — do something they should or shouldn't have, but no one wants to claim responsibility. What's your take? Send us a cybersecurity-related caption to explain the scene, above, ...
As the summer holiday season draws near, phishing scams with travel-themed lures have been gaining momentum, posing a significant challenge to individuals and organizations. A recent survey from ...
Exposure management is a combination of attack surface mapping, vulnerability assessment, and validation, and seeks to keep networks more secure. Pentera’s Omer Zucker outlines exposure management’s ...