Building Resilience: A Post-Breach Security Strategy for Any Organization
In the wake of a recent breach that compromised sensitive information, a healthcare organization sought my guidance on how to…
In the wake of a recent breach that compromised sensitive information, a healthcare organization sought my guidance on how to…
A few years back, my security team was tasked to create and maintain a green field environment for FEDRAMP compliance.…
Trump held a rally at Madison Square Garden Sunday night, the reception from the media has been critical, but there…
by Dan K. Anderson CEO, CISO, and vCISO The cybersecurity landscape is rapidly evolving, and so are the tactics of…
Sophos CEO Joe Levy says $859 million deal to acquire SecureWorks from majority owner Dell Technologies will put the Taegis…
A researcher has released a tool to bypass Google's new App-Bound encryption cookie-theft defenses and extract saved credentials from the…
Delta argues that it lost hundreds of million of dollars in downtime and other costs in the aftermath of the…
It’s often assumed that if the board knew exactly what they wanted to hear from the CISO, they would simply…
In the modern era of technological advancement, artificial intelligence (AI) is revolutionizing business operations, presenting unparalleled opportunities for efficiency and…
Republican lawmakers and leaders reacted after Israel unleashed a targeted strike against Iran in response to the Islamic State's attack…