Smart security leaders need to keep their progress towards Zero Trust under constant review, as the threat landscape changes, ...
Businesses must convince customers their personal data is safe. Run a cybersecurity risk assessment to protect company and customer data.
Conducting cybersecurity audits and backing up sensitive data are best practices, but they happen intermittently.
Drawing on a background in law, public policy and cybersecurity program leadership, Judith Borts brings a wide-angle view to ...
As technical cyber security controls become increasingly sophisticated, threat actors are constantly on the lookout for novel ways to evade and overcome them. A frequent source of success among cyber ...
The Computer Weekly Security Think Tank considers the burdens and responsibilities that accompany the role of chief ...
To get a job in cybersecurity law, you’ll need to bring together legal expertise and a keen understanding of technology. This growing field is essential as businesses and governments face more digital ...