At RSA a few years back, I was in a presentation by a CISO of a major company who asserted that he would spend "whatever it takes" to secure his company. This kind of rhetoric isn't uncommon, ...
Agentic AI has moved the threat boundary inside the enterprise. Mindgard's Aaron Portnoy explains why authority, not access, ...
[Excerpted from "How to Conduct an Effective IT Security Risk Assessment," a new report posted this week on Dark Reading's Risk Management Tech Center.] Many security and compliance projects begin ...
For decades, thanks to popular sci-fi movies and books, the collective imagination has been frequently struck with the idea of intelligent computers outsmarting and replacing humans. Fortunately, that ...
LOS ANGELES--(BUSINESS WIRE)--AuditBoard, the leading cloud-based platform transforming how businesses manage risk, today announced the availability of AuditBoard ITRM, its new IT Risk Management ...
At its core, cybersecurity is the practice of protecting computer systems, networks, and data from theft, damage, or unauthorized access. And where there is a need for protection, there is a need for ...
Rick Hutchinson is the CTO at VikingCloud. He has 17-plus years of experience as an accomplished executive and visionary leader. For years, cybersecurity leaders have answered one question with ...
USB-based attacks, QR codes for phishing and social engineering continue to be some of the most effective, now more dangerous with the help of AI. Low-tech attack vectors are being adapted by cyber ...
Security and risk management leaders face disruptions on multiple fronts: technological, organisational and human. Preparation and pragmatic execution are vital to address these disruptions and ...