You might not think of military planners as the authors of fairy tales, but unfortunately many of us are. As a planner at U.S. Cyber Command (and assorted other headquarters in warmer climates), I ...
In 2026, cyber risk is no longer a distant technical concern that can be safely delegated to IT teams. It is a direct and ...
Artificial intelligence (AI) is doing exactly what security teams hoped it would do: eliminate the repetitive, low-value work that has long burned out junior analysts. But in solving this problem, it ...
Firms that connect cybersecurity with enterprise risk management gain a more complete view of risk. Here’s how finance leaders can foster a more unified approach.
The US Department of Homeland Security (DHS) has warned that Iran might use “low-level cyber attacks” as one way to respond to attacks launched against its nuclear facilities over the weekend. The ...
To build a stronger future workforce, CISOs need to prioritize problem-solving over existing technical knowledge, while broadening their search for talent beyond traditional pipelines. Teamwork, ...
A version of this story appeared in the daily Threat Status newsletter from The Washington Times. Click here to receive Threat Status delivered directly to your inbox each weekday. A version of this ...
Cyber operations have become a defining feature of modern conflict, a front line that shapes the contours of global power competition. Yet despite daily headlines about Chinese hackers breaching ...
LevelBlue today released the LevelBlue Accelerator: C-Suite Cyber Resilience Responsibilities, an analysis of C-level executives who are responsible for cyber resilience with their organizations. The ...
The acquisition is an important step in Sophos’ strategy to help organizations strengthen cybersecurity strategy and governance across all levels of maturity, delivered through the company’s global ...