Building Resilience: A Post-Breach Security Strategy for Any Organization
In the wake of a recent breach that compromised sensitive information, a healthcare organization sought my guidance on how to…
In the wake of a recent breach that compromised sensitive information, a healthcare organization sought my guidance on how to…
All 26 Republican attorneys general joined Virginia in their emergency appeal to the Supreme Court, which could impact the right…
A researcher has released a tool to bypass Google's new App-Bound encryption cookie-theft defenses and extract saved credentials from the…
It’s often assumed that if the board knew exactly what they wanted to hear from the CISO, they would simply…
Hard times create strong men; strong men create good times; good times create weak men; and weak men create hard…
Cisco has added new security features that significantly mitigate brute-force and password spray attacks on Cisco ASA and Firepower Threat Defense…
by Dan K. Anderson CEO, CISO, and vCISO With the rise of software supply chain attacks, organizations are under increasing…
Four companies — Avaya, Check Point, Mimecast, and Unisys — have been charged by the SEC for misleading disclosures in…
Phones used by the Trump and Harris campaigns have reportedly been targeted by Chinese hackers. The FBI and Cybersecurity and…
Amazon has seized domains used by the Russian APT29 hacking group in targeted attacks against government and military organizations to…