Contact Us

SUBSCRIBE TO NEWSLETTER

Security

How Would You Respond To An Active Assailant?

active shooter

A leading security consulting and risk assessment firm conducted a poll on how professionals would react to an active assailant situation.

Education Organizations Face An Increase In Ransomware Attacks

Research reveals education organizations have seen an 84% increase in ransomware attacks over the past six months.

CISO Budgets: More Than Half Have Increased Since 2022

AI Budgets, CISO Budgets

Chief information security officers (CISOs) expect their IAM, Cloud Security and Data Security budget lines to expand, reveals new survey.

Physical Security Incidents Cost Companies $1 Trillion In 2022

Physical Security Incidents

Economic unrest is biggest security-impacting hazard in next 12 months, according to a just-released World Security Report

Behavioral Consequences And Climate Change: Are You Ready?

A new Homeland Security Human Factors Institute program offers professionals help in adapting to the behavioral consequences of climate change.

Cyberattacks, Other Threats Remain Top Concern For All Industries

Business Threats, Business Resiliency

While ransomware continues to make headlines, it’s not the only thing threatening businesses, finds new InformationWeek report.

Juice Jacking: How To Prevent data theft

Juice jacking can pose a serious cybersecurity risk to those using USB ports, cables and chargers to simply charge their devices.

OnSolve Launches New Technology Office In India 

OnSolve India

Reinforcing its commitment to advancing its AI-powered platform, OnSolve is creating 100 jobs in Bengaluru, India.

How Disinformation Could Derail OT Security Risk Management

Disinformation, OT

Security teams need to prepare for the potential for disinformation to impact operational technology (OT) security.

Take Data Loss Prevention Journey In Small, Manageable Steps

Info-Tech Research Group, data loss prevention

Info-Tech Research Group blueprint helps security teams build a data loss prevention strategy aligned with their organization's security program and architecture.

Share to...