News

One chief information security officer shares her experience of marshalling what she learned at the FBI for business security ...
Third-party vendors are a well-known risk but they are often not the last point in the supply chain and cybersecurity leaders ...
LGBTIQ+ organizations in El Salvador are using technology to protect themselves and create a record of the country’s ongoing ...
Ed, Microsoft's Dan Coleman explains how agencies can integrate identity, telemetry, and real-time visibility across their environments to establish a more secure zero-trust posture.
The security manual provides guidance to install, commission, verify and maintain the cybersecurity-certified capability ...
TSC Security steps into that gap with a hands-on, realistic approach. Instead of selling sweeping, one-size-fits-all security packages, they start with what Anderson calls "cyber hygiene.'' ...
The new Cyber Security and Resilience (CS&R) Bill aims to address this challenge. Announced in the King’s Speech in July 2024 and set for introduction in Parliament later in 2025, it represents a ...
At a Wednesday field hearing hosted by the Hoover Institution, the House Committee on Homeland Security pressed for tangible change to address current gaps in cybersecurity infrastructure.
That's the warning sounded by the 2025 AI Security Report, unveiled at the RSA Conference (RSAC), one of the world's biggest gatherings for cybersecurity experts, companies, and law enforcement.
A cybersecurity group found a critical hole in the Nissan Leaf's digital security that lets hackers take the wheel of the electric vehicle, and control other features on the EV hatchback.
The CTR, “Operational Technology Assurance Partnership: Smart Controller Security within National Security Systems,” provides the first steps in developing minimum security requirements for smart ...