North Korean IT workers are using stolen identities to pose as Americans and land high-paying remote IT jobs. Learn how to mitigate this growing cyber-risk.
Threat researchers have found evidence of large-scale quishing activity. Here’s what users and organizations should know about email-based QR code phishing.
To effectively manage cyber-risk, an organization must first define its cyber-risk appetite. Learn how, and explore a cyber-risk appetite statement example.
With SOC as a service, organizations can outsource security monitoring and incident response functions via the cloud. Explore key benefits and challenges.
Alert fatigue is real, and it can cause big problems in the SOC. Learn how generative AI can improve security outcomes and reduce analysts’ frustration in this case study.
At RSAC 2024, a Google researcher described how the search giant has already seen modest but significant success using generative AI to patch vulnerabilities.
Generative AI only recently burst into the collective consciousness, but experts say it is already changing cloud security -- on both the defensive and offensive sides.
The cybersecurity market is growing and changing at a rapid pace, leading to major opportunities for vendors, heightened confusion for buyers and new challenges for CISOs.
AI is all the rage -- and so is shadow AI. Learn how unsanctioned use of generative AI tools can open organizations up to significant risks and what to do about it.
Organizations’ increasing prioritization of cybersecurity has protected most programs from major budget cuts. Even so, many CISOs are feeling the pinch.
Implementing zero-trust security is one of the most important -- and most challenging -- initiatives an enterprise can undertake. Learn how to get started.
The CISO Evolution: Business Knowledge for Cybersecurity Executives offers critical business lessons through a security lens. Learn more in this author Q&A.
The cybersecurity field needs more people who use their powers for good, the lead author of Gray Hat Hacking: The Ethical Hacker’s Handbook, Sixth Edition says.