Is it OK to Take Your CEO Offline to Protect the Network?
November 22 2021Are you asking the right questions when developing your incident response playbook? What security tasks are you willing to automate?
Read moreAre you asking the right questions when developing your incident response playbook? What security tasks are you willing to automate?
Read moreIt engenders a false sense of superiority that spurs complacency among risk managers and executives, who in turn may underinvest in security teams, rely too much on automation, or...
Read moreI have long been annoyed that the word “crypto” has been co-opted by the blockchain people, and no longer refers to “cryptography.” I’m not the only one.
Read moreThe world fills up with cybersecurity tips every year when Black Friday comes round. But what about the rest of the year?
Read moreThere is currently no specific time frame during which banks must report to federal regulators that a security incident had occurred. A new notification rules changes that to 36...
Read more“Eerie video captures elusive, alien-like squid gliding in the Gulf of Mexico.” As usual, you can also use this squid post to talk about the security stories in the news...
Read moreOne of the more common ways cybercriminals cash out access to bank accounts involves draining the victim's funds via Zelle, a "peer-to-peer" (P2P) payment service used by many financial...
Read moreOne of the more common ways cybercriminals cash out access to bank accounts involves draining the victim's funds via Zelle, a "peer-to-peer" (P2P) payment service used by many financial...
Read moreSecurity leaders can be treated as partners supporting the business and share accountability by establishing relationships with business stakeholders.
Read moreThe path out of the ransomware crisis is full inspection and protection of all traffic flows. That means zero trust everywhere — even between servers.
Read more
Recent Comments