HSToday Editorial Board Member Ann Dunkin is calling on organizations to move beyond what is described as “compliance theater ...
Get the latest federal technology news delivered to your inbox. SAN FRANCISCO — Homeland Security Secretary Kristi Noem told a crowd of hundreds of cybersecurity practitioners Tuesday that, despite ...
Nearly a decade after Congress passed the Cybersecurity Information Sharing Act of 2015, the law is facing an uncertain future. Not to be confused with the Cybersecurity and Infrastructure Security ...
Space and Naval Warfare Systems Command (SPAWAR) Systems Center Atlantic (SSC Atlantic) hosts the fifth annual Palmetto Cyber Defense Competition (PCDC) at Trident Technical College in North ...
9to5Mac Security Bite is exclusively brought to you by Mosyle, the only Apple Unified Platform. Making Apple devices work-ready and enterprise-safe is all we do. Our unique integrated approach to ...
As cybersecurity threats accelerate and compliance frameworks gain enforcement power, 2026 will mark a turning point where cyber resilience becomes a core business requirement. The cybersecurity ...
Want smarter insights in your inbox? Sign up for our weekly newsletters to get only what matters to enterprise AI, data, and security leaders. Subscribe Now Adversaries are unleashing new tradecraft ...
The fired chief of California's cybersecurity agency is speaking out about his termination and sounding the alarm over state-wide security concerns. The agency's mission is to prevent cyber attacks.
These up-and-coming companies are offering new approaches to key categories including security operations, email security and protecting the usage of GenAI. As the new year gets underway, a number of ...
It’s common for governors and mayors to declare a state of emergency and activate the National Guard in the aftermath of hurricanes, tornadoes, and other natural disasters. But last month, officials ...
Cyber security has long been likened to building a fortress: thick walls, watchtowers, and a moat separating the inside from the outside. This perimeter-focused approach thrived for decades, but in ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results