
We might have mixed up the priorities of our safety work
As security leaders, our daily work is largely defined by the tools we use and…

As security leaders, our daily work is largely defined by the tools we use and…

Security departments are typically comprised of two core pillars: the Vulnerability Management team and the…

Reporting security performance to the C-suite is perhaps the most daunting challenge a CISO faces.…

Reflecting on security operations over the past two years, many cybersecurity professionals have reached a…

Recently, British automotive giant Jaguar Land Rover (JLR) suffered a significant cyberattack that brought production…

Last month, global attention has focused on the BMW Group’s encounter with the Everest ransomware.…

The release of MITRE ATT&CK Framework v18 should not be regarded as merely a routine…