Offensive Active Defense: The Bad, the Worse, and the Outright Dangerous
There are bad ideas and then there are really, really bad ideas.
There are bad ideas and then there are really, really bad ideas.
As is the case with many cybersecurity projects, getting senior-level support for GDPR compliance efforts requires effective communication. Here are some tips for getting the board on board with GDPR.
As is the case with many cybersecurity projects, getting senior-level support for GDPR compliance efforts requires effective communication. Here are some tips for getting the board on board with GDPR.
Learn about the NIST SP 800-53, a critical component of FISMA compliance, in our Data Protection 101 series.
Learn about the NIST SP 800-53, a critical component of FISMA compliance, in our Data Protection 101 series.
The new President has drawn ire for executive orders on immigration and the environment. A draft of his cybersecurity order, however, makes a heck of a lot of sense.
The new President has drawn ire for executive orders on immigration and the environment. A draft of his cybersecurity order, however, makes a heck of a lot of sense.
If you haven’t been following the news this week, you missed a major story. Wikileaks has revealed that CIA actively engages in espionage. And it uses computers to do so. But for most end users and encryption advocates, this news is good.
26 security pros share the most effective approaches to advanced threat protection.
Learn about the role of data protection in achieving FISMA compliance in Data Protection 101, our series on the fundamentals of information security.