20 characteristics of highly effective cyber security leaders
EXECUTIVE SUMMARY: Every cyber security leader aspires to be a top performer. However, an industry analysis reveals that a mere…
EXECUTIVE SUMMARY: Every cyber security leader aspires to be a top performer. However, an industry analysis reveals that a mere…
By Nicole Allen, Senior Marketing Executive at Salt Communications Probably now more than ever, secure communications are crucial for Policing…
I’m proud to announce the release of the 11th edition of the ENISA Threat Landscape (ETL) on the state of…
The underlying threat to organizations By Kunal Purohit, Chief Digital Services Officer, Tech Mahindra In Today’s world Cyber-attacks may be…
Phishing-as-a-service, or PhaaS, platforms have evolved from the classic phishing attacks as a business model. Less experienced hackers embraced the…
Joe Sullivan, Uber’s CEO during their 2016 data breach, is appealing his conviction. Prosecutors charged Sullivan, whom Uber hired as…
North Korea-linked threat actors are actively exploiting a critical vulnerability CVE-2023-42793 in JetBrains TeamCity. Microsoft warns that North Korea-linked threat…
How robust backup practices can help drive resilience and improve cyber-hygiene in your company
Google TAG reported that both Russia and China-linked threat actors are weaponizing the a high-severity vulnerability in WinRAR. Google’s Threat…
Congressman Bennie G. Thompson (MS-2) is an elected member of the United States House of Representatives from Mississippi’s 2nd Congressional…