Building Resilience: A Post-Breach Security Strategy for Any Organization
In the wake of a recent breach that compromised sensitive information, a healthcare organization sought my guidance on how to…
In the wake of a recent breach that compromised sensitive information, a healthcare organization sought my guidance on how to…
The United States announced charges today against Maxim Rudometov, a Russian national, for being the suspected developer and administrator of…
Aerospace technology is advancing at mind-blowing speed with the advent of advanced artificial intelligence. AI has expanded the possibilities that…
Sophos CEO Joe Levy says $859 million deal to acquire SecureWorks from majority owner Dell Technologies will put the Taegis…
In recent years, video analytics has significantly transformed the interpretation and utilization of visual data. Through advanced algorithms and artificial…
Four companies — Avaya, Check Point, Mimecast, and Unisys — have been charged by the SEC for misleading disclosures in…
Phones used by the Trump and Harris campaigns have reportedly been targeted by Chinese hackers. The FBI and Cybersecurity and…
Russia has sentenced four members of the REvil ransomware operation to over 4 years in prison for distributing malware and illegal circulation…
We’ve got a hard truth to share with you, and you might not like it: You are not your software…
The ongoing prevalence (and rise) of software supply chain attacks is enough to keep any software developer or security analyst…