cybersecurity-news

Establish a comprehensive data security governance framework

Today’s columnist, Marc Punzirudu of PKWARE, says organizations should consult the NIST Cybersecurity Framework to develop an effective governance p...

How to support women in cybersecurity

Cybersecurity is required to be a dynamic industry because cybercriminals don’t take days off. Cybersecurity professionals must be innovative, creat...

How to get departments resistant to security controls to say ‘what took you so long?’

Reframing how a security solution will directly address a concern may help convince someone who was resistant to the change, says leadership columnist...

Talking to children about the internet: A kid’s perspective

A 14-year-old shares his thoughts about technology and the potential privacy and security implications of the internet Talking to children and teenag...

The Zola credential stuffing attack: Who’s to blame?

Today’s columnist, Tomasz Andrzej Nidecki of Invicti Security, says that Zola responded well to its latest credential stuffing incident. (Credit: Zo...

Paving your path to SASE: 4 tips for achieving connectivity and security

Today, optimized network connectivity and security are both first-class citizens; IT teams can no longer sacrifice one for the other. As the number o...

AccessQuint Access360