How a CISO Should Brief the Board of Directors
It’s often assumed that if the board knew exactly what they wanted to hear from the CISO, they would simply…
It’s often assumed that if the board knew exactly what they wanted to hear from the CISO, they would simply…
Hard times create strong men; strong men create good times; good times create weak men; and weak men create hard…
Cisco has added new security features that significantly mitigate brute-force and password spray attacks on Cisco ASA and Firepower Threat Defense…
by Dan K. Anderson CEO, CISO, and vCISO With the rise of software supply chain attacks, organizations are under increasing…
Four companies — Avaya, Check Point, Mimecast, and Unisys — have been charged by the SEC for misleading disclosures in…
Phones used by the Trump and Harris campaigns have reportedly been targeted by Chinese hackers. The FBI and Cybersecurity and…
Amazon has seized domains used by the Russian APT29 hacking group in targeted attacks against government and military organizations to…
Apple created a Virtual Research Environment to allow public access to testing the security of its Private Cloud Compute system,…
John Kelly denounces his ex-boss in a series of interviews with the New York Times. What will Trump allies do…
Hurricane Helene wreaked havoc on communities in Florida, Georgia, and the Carolinas in September. Since then, the pain and suffering…