Sheltering From the Cyberattack Storm – Part Two
In the first part of this series, I discussed sophisticated cyberattacks, analyzed an example, and offered advice on how to remediate…
In the first part of this series, I discussed sophisticated cyberattacks, analyzed an example, and offered advice on how to remediate…
Chicago Public Schools and Chicago Mayor Brandon Johnson came under fire this week as critics lambasted the idea of delaying…
Joe Kernen of CNBC schooled Democratic Sen. Elizabeth Warren of Massachusetts on the history of price controls in a debate…
The proliferation of new top-level domains (TLDs) has exacerbated a well-known security weakness: Many organizations set up their internal Microsoft…
Cyber-Informed Engineering (CIE) is a new perspective on OT cyber risk – one that is being embraced by OT/engineering teams and…
The challenge of locating and utilizing data within organizations has become increasingly problematic. Despite the abundance of data available, much…
Top Democrat surrogates for Vice President Kamala Harris, Sen. Cory Booker and Govs. Wes Moore of Maryland and JB Pritzker…
Ironically, Macs' lower risk profile may make them more susceptible to any given threat than the average Windows or Linux…
There are events in business and life that put everything else into perspective. Sometimes, these are moments of crisis, yet…
Robert F. Kennedy Jr.’s (I) running mate, Nicole Shanahan, recently stated that their 2024 presidential campaign is weighing two options,…