Laden...
The day's top cybersecurity news and in-depth coverage
August 24, 2020
So-called confidential computing approaches allow data to remain encrypted while in use. That's best done in hardware, and IBM, AMD and Intel are following different paths, each with its own trade-offs. Read more â¶
Many organizations lack the internal expertise to address threat detection and response effectively; MDR can fill the gap. Hereâs what to look for when you shop for MDR services.
Back in early Spring, ensuring users could access the necessary applications securely from home was priority No. 1. Now, 3-4 months later, work from home looks like it's here to stay ⦠for a while, at least. Here's your to-do list for the next 6 months and beyond.
CISOs are finding ways to inject more business skills into their teams through recruitment, training and staffing strategies that broaden workersâ horizons â strategies that they say are paying off with stronger security and better aligned risk management.
Cybersecurity is now a board-level issue, but many organizations still struggle to get security risk management right.
New research from ESG and ISSA illustrates a lack of advancement in bridging the cybersecurity skill shortage gap.
© 2024