IT Governance Podcast 20.10.23: Casio, Cisco, MOVEit (again) and the ICC
This week, we discuss a data breach affecting Casio users in 149 countries, two zero-day vulnerabilities in Cisco’s IOS XE…
This week, we discuss a data breach affecting Casio users in 149 countries, two zero-day vulnerabilities in Cisco’s IOS XE…
MxD, the digital manufacturing and cybersecurity institute, announced a new partnership with the National Institute of Standards and Technology’s (NIST)…
The City of Philadelphia discloses a data breach that resulted from a cyber attack that took place on May 24…
By Timothy Hollebeek, Industry Technology Strategist, DigiCert The rise of post-quantum cryptography (PQC) is shedding light on the pervasive nature…
Researchers discovered three critical remote code execution vulnerabilities in the SolarWinds Access Rights Manager (ARM) product. Security researchers discovered three…
Best practices for avoiding novel threats online By Tom McVey, Senior Sales Engineer EMEA, Menlo Security Artificial intelligence has transformed…
Susan Landau published an excellent essay on the current justification for the government breaking end-to-end-encryption: child sexual abuse and exploitation…
Why not take advantage of the Surfshark VPN Black Friday deal? Have you always wanted to access a premium VPN…
Time to start your Black Friday shopping! If you’re looking for the best Surfshark antivirus Black Friday deal, you’ve come…
As businesses have become increasingly susceptible to cyberattacks, the use of Cybersecurity-as-a-Service, or CSaaS, has become more important. In this…