Turns out that helming the forefront of cybersecurity is not a shield from basic mistakes. Such was the lesson buried in a ...
The greatest vulnerability was the retail workforce: Most retailers lack sufficient internal cybersecurity staff, and seasonal employees rarely receive cyber training, making them easy targets. These ...
Zero trust means no automatic trust; access is verified continuously. Key domains include identity, devices, applications, data, and telemetry. Experts emphasize scalable, incremental adoption for ...
When I wrote about the state of data protection laws in the US in 2023, I spoke to Wade Barisoff, a cybersecurity expert, who told me that capitalism is holding back data security in the United States ...
In late February, UnitedHealth Group’s Change Healthcare unit faced a significant ransomware attack, sending shockwaves through the healthcare sector with far-reaching financial consequences. It has ...
2025 was a wild ride for cyber security. The landscape is shifting faster than ever, and several themes stand out when I think about the most important cyber security lessons from the year.
From the growing sophistication of zero-day exploits to the entrenchment of nation-state and cybercriminal alliances, 2024 delivered more evidence of how quickly the threat landscape continues to ...
The highlight of October’s National Cybersecurity Awareness Month activities at Boston College was a presentation by former Federal Bureau of Investigation senior executive Joseph R. Bonavolonta, now ...
Few leaders are prepared for what a major cyber breach actually feels like. From the outside, incidents become timelines and headlines. Inside the organization, controlled chaos takes hold as ...
Fueled by an interest in technology, Baylee Blanton taught herself to code in middle school. She’d later join the robotics team, but that outside of that, couldn’t find other outlets to pursue her ...
The past 12 months have been a trying time for cyber security professionals globally. Most notably, they’ve had to contend with a rise in cyber attacks linked to the war in Ukraine. At the same time, ...
Hacking group CL0P’s attacks on MOVEit point to ways that cyber extortion may be evolving, illuminating possible trends in who perpetrators target, when they time their attacks and how they put ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results