Cyber Essentialism & ‘Doing Less With Less’
June 8 2023Cybersecurity benefits from a focus on the vital few chores rather than the trivial many. Find the "right things" to encourage strategic thinking, then move the culture needle to...
Read moreCybersecurity benefits from a focus on the vital few chores rather than the trivial many. Find the "right things" to encourage strategic thinking, then move the culture needle to...
Read moreThreat actors are lifting public images and videos from the Internet, altering them, and posting them online in a new wave of sextortion campaigns.
Read moreBy stepping in to provide aid, the federal government could help protect companies, insurers, and the economy from the impact of a widespread, catastrophic cyberattack.
Read moreCisco laid out its AI plans and a vision for unified cloud security during Cisco Live 2023.
Read moreNew paper: “Lessons Lost: Incident Response in the Age of Cyber Insurance and Breach Attorneys“:
Abstract: Incident Response (IR) allows victim firms to detect, contain, and recover from security...
Read more
In a zero-trust world, a trusted identity is the key that unlocks access for people and devices to enter your enterprise’s key networks, systems, and resources.
Read moreRansomware continues its runaway growth with median payments reaching $50,000 per incident.
Read moreIn addition to injecting a card skimmer into target Magento, WooCommerce, Shopify, and WordPress sites, the the threat actor is also hijacking targeted domains to deliver the malware to...
Read moreIn addition to injecting a card skimmer into target Magento, WooCommerce, Shopify, and WordPress sites, the the threat actor is also hijacking targeted domains to deliver the malware to...
Read moreThe company plans on disputing these fines once a final decision is made, but warned shareholders that it set aside the funds to pay it, nonetheless.
Read more
Recent Comments