Detection engineering with detection-as-code (DaC) can advance security operations just as DevOps improved the app development world. Here are compelling benefits of this trending approach to threat detection.
Data classification is growing in importance with the emergence of regulations like GDPR and CCPA. It's time for CISOs and CPOs to join forces to meet these data security challenges.
A new chapter of cyberwarfare has unfolded with U.S. recent cyberattacks against Iran and Russia. What would the future digital battleground look like and how could nations defense against such threats?
A haphazard technology roll-out of a new voting app led to tech issues that delayed the Iowa caucus results and threw the public into states of confusion and frustration.
Since June 1, eight U.S. states have either amended or enacted tougher new data breach notification laws requiring notification anywhere between 30 to 60 days. While still a far cry from the 72 hours required under the European GDPR, tougher notification laws will no doubt be adopted around the world.
The legal battle between Facebook-owned WhatsApp and the Indian government is a bit of a high-stakes game of chess determining both global consumer privacy and the sovereignty of tech companies to build such privacy on their own platforms.
The private sector is increasingly turning to cyber insurance to at least mitigate some of the effects of hacking, however governments across the globe seem to have been slow to take advantage. Given the severity of the cyber threats, is it time for public sector agencies to leverage cyber insurance offerings?
With July 1 CCPA enforcement deadline fast approaching, have organizations taken the necessary steps to achieve compliance and remain compliant in the future?
Given the growth of wire fraud and grey area when it comes to liability, creating a system that guarantees protection has become incredibly important. The best way to prevent uncertainty about who is at fault is to prevent the risk from happening all together.
Growing gap in cybersecurity workforce can be addressed by tapping into real-time information and threat intelligence from SOC analysts and security teams around the world.