Stephen regularly writes about technology, business continuity, compliance and project management. He's worked with companies such as Canva.com, EnergyCentral.com, and Citibank.
Germany’s interior ministry has proposed a new draft cybersecurity bill dubbed IT Security Act 2.0. Here are its highlights.
Enterprise IT security comprises different parts that must work in concert. Overall security is only as good as the weakest link in the chain.
The recent rash of cyberattacks on critical infrastructure has left IT security executives with deep worries. These concerns are valid. Here is why.
COVID-19 has changed the world forever and cybersecurity is no exception. Here’s what you can do to help minimize the risks.
Did you expect new forms of digital communication would diminish email security importance? That hasn’t happened — and it won’t happen.
The CISO is the pinnacle of a career in information security. To be successful in this role, one must overcome a myriad of CISO challenges.
While going on leave is good for both organization and employee, there are cybersecurity dangers that emerge when a worker is away.
Privacy-as-a-service is increasingly looked upon as a smart, practical solution in the future management of privacy risks.
A cyberattack recovery plan should be designed and ready to go well before a cyberattack occurs. Here’s some tips to make your plan a reality.
Join Our Newsletter
Learn about the latest security threats, system optimization tricks, and the hottest new technologies in the industry.
Over 1,000,000 fellow IT Pros are already on-board, don't be left out!