(Image: Galix) Supply chain attacks ... conducting vendor risk assessments, including security posture, compliance with regulations such as POPIA and adherence to industry security standards or ...
Supply chain attacks are becoming more frequent and increasingly sophisticated, with malicious actors targeting businesses indirectly through their third-party vendors. In South Africa, where ...
Cyber inequity is a growing chasm that continues to separate organizations with robust cybersecurity and technology capabilities from those without. This digital divide is a global cybersecurity ...
Within the U.S. government, NIST and other agencies collaborate with the public and private sector to research, develop, and share supply-chain risk management tools and practices. Many firms ...
Social engineering remains a major cybersecurity threat. Learn how businesses can enhance cyber resilience against evolving ...
CISOs lead AI strategy without clear guidance. The CLEAR framework helps security teams track AI, enforce policies, and drive ...
AI is revolutionizing business, but its vulnerability to attacks and ethical breaches is a ticking time bomb. Learn how to ...
An examination of key data privacy and cybersecurity developments in 2024 and emerging trends and risks for 2025, including ...
On January 16, 2025, former President Biden issued the Executive Order on Strengthening and Promoting Innovation in the Nation’s Cybersecurity (the EO). [1] The EO directs various parts of the ...
DORA also affects regions outside of the EU. Although the Digital Operational Resilience Act (DORA) is an EU regulation, it ...
The DoD first announced the CMMC in 2020, and it finally took effect in December 2024, so all government contractors should now consider it.