Too many business leaders still treat cyber security as a technical support function rather than an enterprise risk that requires oversight and strategic management. That mindset is no longer ...
Edward Tuorinsky, Managing Principal of DTS, brings two decades of experience in management, cybersecurity, compliance and IT services. The traditional approach to risk mitigation is to assess and ...
Smaller organizations are increasingly under attack, with ransomware emerging as the dominant threat. According to the Verizon 2025 Data Breach Investigations Report, ransomware was involved in 88% of ...
With rapid technological progress, it is estimated that nearly 200 billion connected devices, ranging from medical equipment and industrial machines to cars, smartphones, and home appliances, will be ...
ISO/IEC 27001 is the international benchmark for establishing, implementing, maintaining and continually improving an ...
As the use and development of artificial intelligence (AI) continues to accelerate nearly every industry, the call for effective and reasonably applied governance has never been louder. From ...
Note: This is the second of a two-part series on what 2026 holds in store for cybersecurity from both a technology and an executive management perspective. Today, we look at how resilience, executive ...
Third-party vendors are a well-known risk but they are often not the last point in the supply chain and cybersecurity leaders need to ensure fourth-party providers are given the same treatment. Fourth ...
In the fast-paced world of cybersecurity, it's easy to get caught up in the hype of the latest technology trends or the panic of a high-profile data breach. With the landscape growing increasingly ...
The conversation around cybersecurity often centers on firewalls, multi-factor authentication or employee training. But one of the most common and overlooked findings in IT audits has nothing to do ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results