In this topic segment, we discuss the most interesting insights from the 2025 edition of Verizon's DBIR.
You can grab your own copy of the report at https://verizon.com/dbir
Cybersecurity teams were under increasing strain in 2024. To alleviate this burden, 2025 will see greater reliance on automation to streamline workflows, enhance threat detection, and accelerate incident response. But some of these investments may come with risks.
Greg Sullivan, Founding Partner at CIOSO Global, joins Business Security Weekly to d...
The 2025 U.S. Cybersecurity Job Posting Data Report highlights significant shifts in cybersecurity hiring, with a rise in governance and compliance roles, a decline in traditional security engineering positions, and increasing demand for legal and policy-focused professionals in response to evolving regulatory and technological landscapes.
How to enhance cyber resilience by augmenting an existing security strategy, especially one that may be rooted in legacy approaches, so that organizations get the most bang for their buck.
In 2011, Marc Andreessen predicted that software would eat the world. Specifically, the prediction was that software companies would take over the economy and disrupt all industries. The economic prediction has mostly come true, with 9 out of 10 of the most highly valued companies being tech companies. The industry disruption didn't materialize in ...
The top information-technology officers in an organization often clash, hampering efforts to bolster cyber resilience. Here’s how to make sure your CIO, CISO and CTO are on the same page.
In this latest Enterprise Security Weekly episode, we explored some significant cybersecurity developments, starting with Veracode’s acquisition of Phylum, a company specializing in detecting malicious code in open-source libraries. The acquisition sparked speculation that it might be more about Veracode staying relevant in a rapidly evolving marke...
Fast Five
Selected by the SC Media Editorial team every Tuesday.
Sign up now for the top five issues cybersecurity pros need to know this week.