Bank consortium founds company to vet third-party vendors
Whenever a company announces a data breach hearing that an error by a third-party vendor was behind the disaster is a very common occurrence.
Whenever a company announces a data breach hearing that an error by a third-party vendor was behind the disaster is a very common occurrence.
While vampires, ghouls and goblins may be enough to scare some of our readers, zero-day exploits, ransomware, and costly data breaches are guaranteed to send chills down any CISO’s spine. To ensure you have a proper Halloween scare, SC spoke with a few industry professionals about some of the spookiest malware they’ve encountered. 6. EternalBlue:STEALTHbits…
With phishing and business email compromise-style attacks the primary methods used by cybercriminals to gain access to an organization, it is imperative that employees be taught what to look out for when going through their email. So SC Media asked some top cybersecurity executives for their best training tips.
SecureAuth and Core Security reported today plans to merge the two companies.
Finding a good candidate, or possibly any candidate, to fill one of the thousands of open cybersecurity positions available is one of the greatest challenges facing security executives today.
Juniper Networks announced on August 31 it had entered into an agreement to acquire Cyphort in a deal that is expected to close by the end of September.
The first half of 2017 has not exactly been a ride in the park for cybersecurity professionals.