Cybersecurity jobs continue to top the 'Most Wanted' list, but pressures to stop and diminish the damage of hackers is fueling a variety of new key roles.
Here are steps that will extend a risk management program to include outside vendors and reduce the likelihood of a breach due to factors outside an organization’s control.
A federal judge ruled that millions of users can proceed as a group with claims that its photo-scanning technology violated an Illinois law by gathering and storing biometric data without their consent.
Earlier this month, at least seven U.S. pipeline companies said their electronic communications systems were shut down, with five confirming the disruptions were caused by a web attack.
The announcement included advice to companies about how to protect themselves and warned specifically of attacks on routers, the devices that channel data around a network.
Many company leaders feel prepared for the upheaval that emerging technologies represent, but few are ready for the operational, competitive, cultural and security shifts already taking place,
Cyber threats continue to grow in frequency and sophistication . Here are the ones organizations need to be most aware of, and how to put up a best defense.