As a Chief Information Security Officer (CISO), you have the responsibility of not only directing your organization’s security but also conveying your risk status to leadership.Read More »
If you are looking to book a cyber security speaker, there’s a strong chance you are considering a digital broadcast. After all, the COVID-19 pandemic has made it nearly impossible for event planners to host in-person events.Read More »
So, you've decided to run a penetration test against your organization. But now... what do you do with the results?
With so many vulnerabilities exposed, where should you even start? As a matter of fact, how do you even read this technical report?Read More »
Is your company in the process of developing a new application? Whether it’s an internal app intended for employee use or a public-facing external web app, there’s a lot of work that goes into creating and rolling out a cutting-edge application.
In fact, your company may invest hundreds or thousands of hours designing and developing this new application— so it’s no wonder that once it’s ready for launch, you want to immediately use it.Read More »
If the year 2021 was a cyberattack, we’d have to crown it, “The King of Ransomware.” That’s because this past year has been downright riddled with cybercriminals demanding a ransom to unlock seized systems.Read More »
Are you only using multi-factor authentication (MFA) because you've been told over and over that you need to? If you are, you’re not alone. Many organizations adopt an MFA policy to be more secure, yet are still unsure as to how it works and why their company needs it so badly.Read More »