News

PHILIPPINE information technology-business process management (IT-BPM) companies must ensure stronger authentication measures ...
Non-human identities were already a challenge for security teams before AI agents came into the picture. Now, companies that ...
Cybersecurity programs often fail because they overlook the biggest risk: human behavior. But the same factor that makes organizations vulnerable can also be your greatest asset—if you know how to ...
HBNR, which imposes specific notification requirements on vendors of personal health records (PHRs) and PHR related entities ...
Threat readiness means being able to identify, prepare for and respond to cybersecurity threats. While all organizations ...
DoT’s Mobile Number Validation platform may require businesses to validate user phone numbers, raising compliance and privacy ...
With the Cybersecurity Information Sharing Act of 2015 set to expire this fall, lawmakers face mounting pressure to update ...
Cyberattacks are targeting the infrastructure we rely on every day—hospitals, power grids, supply chains. The Cybersecurity ...
The law that established our current system for sharing information about cyberthreats is coming up on its tenth birthday, and its reauthorization deadline. Much has changed since the law was enacted ...
Exempting the material shared from information disclosure laws like [the Freedom of Information Act], as well as antitrust protections. Join us Aug. 26 for Workforce Reimagined, a one-day virtual ...
As the Trump administration refines its cybersecurity, resilience, and critical infrastructure security strategies—most recently through its June 2025 Executive Order amending EO 14144 and EO 13694—it ...