The CSO Conference & Awards: A Brief History
Blockchain Technology: From Hype to The Future
Tools to Meet Tomorrow’s Mobile Cybersecurity Threats for Government
Account Takeover Fraud: Navigating the Treacherous Digital Waters
The Importance of Jailbreaks for iOS Security Work
{Latest Posts}
6 Steps Every CISO Should Take to Set Their Organization Up for Success
Are you taking on the role of a CISO in your organization? Are you looking for ways to maximize business impact in your tenure as a Chief Information Security Officer? We have put together 6
Security and Hacking Issues with Metaverse
All technology has its own advantages and disadvantages, and virtual reality technologies are no different. Metaverse, the latest in virtual reality, may seem like it’s only good, but there are several security concerns that should
Are Businesses Prepared to Fight Bot Attacks on APIs?
According to a new report, API attacks exploded in 2021 as malicious bots continued to invade the internet. Compared to last year’s data collection, there was an increase of 41% in attacks on Internet-connected systems. Media
The Untold History of Women in Cybersecurity
In the past, women’s role in the tech industry has been underrepresented, however, women have long been active in information security. Their contributions are often overlooked and under-appreciated. Perhaps because women’s stories aren’t told as
Crowdsourced Security is out of Control in the Ukraine Conflict
The Russian invasion of the Ukraine was bound to have a part of the conflict rooted in cyberspace. The rise of crowdsourced security in the current war has taken an interesting turn.
5 Best Practices for Ensuring Secure Software Deployment
Security is a part of the Software Development Life Cycle (SDLC) that needs to be made a part of every cycle process, especially deployment. Secure software deployment does not start when the software is being
4 Practices for Cyber Supply Chain Risk Management (C-SCRM)
The global supply chain is a powerful part of the economy that connects countless businesses and customers worldwide. As supply chains gain more power, cybercriminals are increasingly targeting them to escalate the impact of their
The Importance of WAAP for Businesses Today
Web applications and APIs today form the core of an organization’s interface with its customers, partners, and other stakeholders. Given their growing public use and prevalence and the growing range of threats facing them, the