How Network Logging Mitigates Legal Risk
September 23 2019Logging that is turned on, captured, and preserved immediately after a cyber event is proof positive that personal data didn’t fall into the hands of a cybercriminal. One of...
Read moreLogging that is turned on, captured, and preserved immediately after a cyber event is proof positive that personal data didn’t fall into the hands of a cybercriminal. One of...
Read moreLogging that is turned on, captured, and preserved immediately after a cyber event is proof positive that personal data didn’t fall into the hands of a cybercriminal. One of...
Read moreSecurity leaders are increasingly making their case through metrics, as well they should – as long as they’re not one of these. After a decade or more of exhortations...
Read moreSecurity leaders are increasingly making their case through metrics, as well they should – as long as they’re not one of these. After a decade or more of exhortations...
Read moreCrowdsourced platforms have redefined both pentesting and the cybersecurity gig economy. Just not in a good way. Let’s pretend you have offensive security skills and you want to use...
Read moreCrowdsourced platforms have redefined both pentesting and the cybersecurity gig economy. Just not in a good way. Let’s pretend you have offensive security skills and you want to use...
Read moreThe identity management company plans to sell 12.5 million shares, raising $187.5 million in its initial public offering. Identity management company Ping Identity today announced its initial public offering...
Read moreThe identity management company plans to sell 12.5 million shares, raising $187.5 million in its initial public offering. Identity management company Ping Identity today announced its initial public offering...
Read moreHow criminals today bypass smartphone anti-theft protection and harvest AppleID and passwords taken from fake Apple servers. The nature of spearphishing attacks has drastically evolved: We’ve moved from crudely...
Read moreHow criminals today bypass smartphone anti-theft protection and harvest AppleID and passwords taken from fake Apple servers. The nature of spearphishing attacks has drastically evolved: We’ve moved from crudely...
Read more
Recent Comments