We are wrapping up a monumental year for cybersecurity as we prepare for 2019. Looking back over the last 12 months, we saw several catastrophic breaches victimize millions of users across the globe - ...
Zero trust means no automatic trust; access is verified continuously. Key domains include identity, devices, applications, data, and telemetry. Experts emphasize scalable, incremental adoption for ...
The Fast Company Executive Board is a private, fee-based network of influential leaders, experts, executives, and entrepreneurs who share their insights with our audience. BY Matt Tengwall Imagine ...
Investigators have concluded a 10-week probe of southeastern Pennsylvania's Lower Merion School District and found no evidence that school officials used the LANrev Theft Track solution, which is ...
The move to agile development practices poses both challenges and opportunities to security teams -- with the challenges often dominating. But some organizations have found ways to make it work. What ...
McDonald's experienced a major security incident in June that resulted in the exposure of data belonging to apparently millions of job applicants. Earlier this month, security researchers Ian Carroll ...
While VoIP is all the rage, VoIP security is often underplayed and frequently goes unaddressed. Not by telecom industry expert, Ike Elliott. A long time colleague and friend of mine, Ike led the ...
Opinions vary widely on the merits of the Affordable Care Act. There is little doubt, however, that the roll-out of the Affordable Care Act's website Healthcare.gov leaves something to be desired.
Secure messaging app Signal has been in the spotlight this week for national-security reasons, but companies can also learn lessons from the Trump administration’s misstep. After national-security ...
The World Bank is making headlines after a disputed report claims hackers managed to access their secure network for over a year. One security pro offers takeaways that everyone can learn from the ...