| Security News from 'DarkReading' |
| Showing 'Security News from 'DarkReading'' from 1 to 10|
| |Why DPOs And CISOs Must Work Closely Together Recent data protection laws mean that the data protection officer and CISO must work in tandem to make sure users data is protected.
| |Cybersecurity Lessons Learned From The Rise Of Skywalker Theyre especially relevant regarding several issues we face now, including biometrics, secure data management, and human error with passwords.
| |Avoid That Billion-Dollar Fine: Blurring The Lines Between Security And Privacy While doing good for the user is the theoretical ideal, the threat of fiscal repercussions should drive organizations to take privacy seriously. That means security and data privacy teams must work more closely.
| |Data Awareness Is Key To Data Security Traditional data-leak prevention is not enough for businesses facing todays dynamic threat landscape.
| |Are We Secure Yet? How To Build A Post-Breach Culture There are many ways to improve your organizations cybersecurity practices, but the most important principle is to start from the top.
| |Phishing Today, Deepfakes Tomorrow: Training Employees To Spot This Emerging Threat Cybercriminals are evolving their tactics, and the security community anticipates voice and video fraud to play a role in one of the next big data breaches -- so start protecting your business now.
| |Active Directory Needs An Update: Heres Why AD is still the single point of authentication for most companies that use Windows. But it has some shortcomings that should be addressed.
| |Why Firewalls Arent Going Anywhere Written off multiple times as obsolete, firewalls continue to elude demise by adding features and ensuring that VPNs keep humming.
| |How SD-WAN Helps Achieve Data Security And Threat Protection Enterprises currently consider the technology a best practice because of its flexibility, scalability, performance, and agility.
| |Global Predictions For Energy Cyber Resilience In 2020 How prepared is the energy sector for an escalating attack surface in the operating technology environment? Here are five trends to watch.
| 1 2 3 4 5 6 7 8 9 10 Older » |