NEW YORK--(BUSINESS WIRE)--Offensive Security, the leading provider of hands-on cybersecurity training and certification, today announced the launch of two new courses, expanding the company’s ...
When the IBM PC was new, I served as the president of the San Francisco PC User Group for three years. That’s how I met PCMag’s editorial team, who brought me on board in 1986. In the years since that ...
An old security technology that has gotten little attention is finally ready for a new closeup. It goes by the name polymorphic code — or alternatively, automated moving target defense or AMTD — and ...
Steve Durbin is Chief Executive of Information Security Forum. He is a frequent speaker on the Board’s role in cybersecurity and technology. As organizations deepen their reliance on digital ...
The Common Vulnerabilities and Exposures (CVE) program has been a constant for the cybersecurity community for more than 25 years. Operating behind the scenes, the program has consistently connected ...
More than three-quarters of companies regularly take 10 common security steps to improve their overall defensive posture, including instrumenting their Secure Development Lifecycle (SDLC) and using ...
The tactics employed by cybercriminals have become increasingly sophisticated, and they continually evolve to evade the security measures organizations are implementing to thwart them. While it’s ...
In the early cybersecurity days, working as a professional strategist was viewed as a part-time endeavor, with these skills often put on the back burner for other corporate priorities. These skills ...
Recent industry reports consistently show that over 80% of breaches involve human error, whether through phishing, credential ...
The United States aims to continue Russia's isolation at the United Nations as it takes the reins at the top table of the global governing body this month. Speaking at the U.N. headquarters in New ...