The FSCA’s Joint Standard on Cybersecurity and Cyber Resilience is set to commence in June 2025, putting pressure on South ...
Canadians are told that they’re free to use the products of a company that has been publicly shamed and accused of ...
Chinese hackers infiltrated T-Mobile and other telecom giants in a months-long campaign to spy on high-value targets. How would they address this situation?
As more businesses move their operations and data to the cloud, the need for strong protection against cyber threats has ...
As the maritime industry becomes increasingly digitized, it also becomes more vulnerable to damaging cyberattacks.
“What's changed is that cyber is now a business risk and directors are expected to respond to the cyber security risk in line ...
The value of threat modeling extends far beyond meeting compliance mandates, extending into more efficient business ...
While integrating operational technology (OT) with information technology (IT) drives efficiency and innovation, it also ...
Businesses that handle significant amounts of sensitive personal data, as well as those that handle any amount of certain U.S ...
Gary S. Miliefsky, CISSP, fmDHS As the publisher of Cyber Defense Magazine, I have a great honor and pleasure to meet with ...
Insights into the challenges organisations face in securing removable media, along with practical advice for enhancing its security. By James Neilson ...
The CISO Forum Virtual Summit took place on November 13th in SecurityWeek’s Virtual Conference Center. Watch now on demand.