Faced with an overwhelming adversary, Game of Thrones heroes Daenerys Targaryen and Jon Snow have a lot in common with today’s beleaguered CISOs. Strong similarities exist between the precarious...
Read moreFaced with an overwhelming adversary, Game of Thrones heroes Daenerys Targaryen and Jon Snow have a lot in common with today’s beleaguered CISOs. Strong similarities exist between the precarious...
Read moreVPNs are the primary tool for securing remote access, but recently disclosed vulnerabilities point out the weakness of relying on them as the only tool. “Encryption Everywhere” has become...
Read moreVPNs are the primary tool for securing remote access, but recently disclosed vulnerabilities point out the weakness of relying on them as the only tool. “Encryption Everywhere” has become...
Read more‘Sea Turtle’ group has compromised at least 40 national security organizations in 13 countries so far, Cisco Talos says. A sophisticated state-sponsored hacking group is intercepting and redirecting Web...
Read moreHow Not to Acknowledge a Data Breach
April 18 2019I’m not a huge fan of stories about stories, or those that explore the ins and outs of reporting a breach. But occasionally I feel obligated to publish such...
Read moreHow Not to Acknowledge a Data Breach
April 18 2019I’m not a huge fan of stories about stories, or those that explore the ins and outs of reporting a breach. But occasionally I feel obligated to publish such...
Read moreNew Malware Campaign Targets Financials, Retailers
April 18 2019The attack uses a legitimate remote access system as well as several families of malware. A new wave of cyberattacks uses legitimate remote access software to take over user...
Read moreNew Malware Campaign Targets Financials, Retailers
April 18 2019The attack uses a legitimate remote access system as well as several families of malware. A new wave of cyberattacks uses legitimate remote access software to take over user...
Read moreBreaches and compliance requirements have heightened the need for continuous and effective employee training, security experts say. Image Source: Shutterstock Employee security awareness training programs have become a necessity...
Read more
Recent Comments