Join us on May 2nd, as we discuss preparing for DDoS attacks, building resiliency, overcoming obstacles and key preparations to make now before ransomware attacks.
A leading cybersecurity luminary argues that more technically-educated individuals must come forward to do the work necessary to ensure government tech policies are informed by trained, technical-minded professionals.
Apple Inc.’s top security engineer on Thursday said the company would begin distributing special iPhones to security researchers to help them discover flaws before malicious hackers do.
The transaction announced Thursday will refocus Symantec on its consumer-facing products, such as the LifeLock identity-protection brand and Norton antivirus software.
Keynote speaker Dino Dai Zovi argues that in an environment where software and cloud services are at the core of much of what IT accomplishes in business, security has a new and critical opportunity to work with others, and to make an impact...
The use of human reviewers by Apple, Google and Amazon already has spurred examinations by lawmakers and regulators in the U.S. and Europe. Privacy advocates have voiced concern that the companies’ practices could violate users’ rights...
The growth of AI-based fake videos have security managers looking at how they might impact their organization -- deepfakes have the very real ability to be used in criminal activity against businesses.
“It’s a full-on war for cyber talent,” said Matt Comyns, a managing partner at executive search firm Caldwell Partners who specializes in information security. “CEOs know that, so they play hardball. Everyone’s throwing money at this.”