2025 was a wild ride for cyber security. The landscape is shifting faster than ever, and several themes stand out when I think about the most important cyber security lessons from the year.
Zero trust means no automatic trust; access is verified continuously. Key domains include identity, devices, applications, data, and telemetry. Experts emphasize scalable, incremental adoption for ...
A coordinated government response helped contain the ransomware attack that disrupted America’s gas supply. Are we ready for ...
The Fast Company Executive Board is a private, fee-based network of influential leaders, experts, executives, and entrepreneurs who share their insights with our audience. The greatest vulnerability ...
The highlight of October’s National Cybersecurity Awareness Month activities at Boston College was a presentation by former Federal Bureau of Investigation senior executive Joseph R. Bonavolonta, now ...
Cybersecurity success requires consistent, proactive effort like physical fitness Prevention and preparedness outweigh reactive firefighting for lasting results Balanced strategies address technical ...
From the growing sophistication of zero-day exploits to the entrenchment of nation-state and cybercriminal alliances, 2024 delivered more evidence of how quickly the threat landscape continues to ...
The past 12 months have been a trying time for cyber security professionals globally. Most notably, they’ve had to contend with a rise in cyber attacks linked to the war in Ukraine. At the same time, ...
When Russia’s full-scale invasion of Ukraine began in 2022, the conflict unfolded across land, air, and sea—but also across networks, data centers, and personal devices. Ukraine became one of the ...
In late February, UnitedHealth Group’s Change Healthcare unit faced a significant ransomware attack, sending shockwaves through the healthcare sector with far-reaching financial consequences. It has ...
Hacking group CL0P’s attacks on MOVEit point to ways that cyber extortion may be evolving, illuminating possible trends in who perpetrators target, when they time their attacks and how they put ...