What Healthcare Cybersecurity Leaders Should Know About the FDA’s Section 524B Guidelines
New cybersecurity regulations from the FDA outline specific steps that medical device companies must take in order to get their…
New cybersecurity regulations from the FDA outline specific steps that medical device companies must take in order to get their…
Researchers used machine learning to analyze Hungarian media reports and found Russian narratives soured the nation's perspective on EU sanctions…
Cybersecurity isn't a one-time task. It's an ongoing effort that needs regular checks, updates, and teamwork.
Understanding the risks of generative AI and the specific defenses to build to mitigate those risks is vital for effective…
University of Jeddah partners with Resecurity to teach cybersecurity skills.
China pairs cyber and kinetic attacks in the South Pacific as it continues to wrangle control of the South China…
CISA expects to extend this program to include up to 100 critical infrastructure entities in its first year.
The Known Exploited Vulnerabilities (KEV) catalog is a high-quality source of information on software flaws being exploited in the wild,…
Business users are building Copilots and GPTs with enterprise data. What can security teams do about it?
CISOs and vendors must work together to keep up with emerging threats and find solutions, says a group of CISOs…