National security questions have resulted in mega smartphone manufacturer Huawei being banned by the Australian government from participating in the that nation’s 5G network rollout.
According to a recent (ISC)2 report, women now comprise 20% of cybersecurity workers. But without defining what jobs are being included, it’s unclear whether we’re truly making progress.
Protecting data and thwarting cyberattacks now have ascended alongside dealing with natural catastrophes as the most pressing threats demanding the world’s full attention.
While the current vendor environment clearly poses significant challenges and risks to businesses entrusting them with their data, use of encryption can, at least in many cases, materially mitigate that risk. The devil, however, is in...
The coming flood of turn-of-the-decade forecasting offers a great opportunity to reorganize business plans, security plans and even career plans – if you are watching for the right things.
J.M. Porup, senior writer at CSO online, joins Juliet on this week's episode of TECH(talk) to discuss trends in ransomware, IoT security and enterprise cybersecurity roles.
In the early days of 2019, cybersecurity is as challenging as ever. We highlight some of the biggest cybersecurity trends that are set to impact the enterprise, security professionals and companies of all sizes in the year ahead.
Data breaches are not created equal. Business leaders and security managers must beware the dangers of FUD and hype created around notification of old breaches.
If the start of 2019 is anything to base the year ahead on—with data breaches, shakiness in the market and the government shutdown negotiations at an impasse—cybersecurity experts are going to have their hands full with increasingly...
The positive potential of big data is enormous, spanning virtually all industries and impacting both the public and private sectors. However, we must also be mindful of safeguarding big data as much as collecting and utilizing it.
Emerging standards and frameworks such as Gartner CARTA, Zero Trust, NIST SP 800 and IDSA provide guidelines, but how organizations manage identity and access management in 2019 is what matters most.
In this episode, host Maryfran Johnson talks with Elizabeth Hackenson, CIO at Schneider Electric, about talent acquisition, Schneider Electric's new capabilities on mobile devices, and the value of having a "healthy paranoia" about...