How a CISO Should Brief the Board of Directors
It’s often assumed that if the board knew exactly what they wanted to hear from the CISO, they would simply…
It’s often assumed that if the board knew exactly what they wanted to hear from the CISO, they would simply…
The UK and EU GDPR (General Data Protection Regulation) restrict transfers of personal data outside the UK and EU respectively.…
This blog is part of a larger NIST series during the month of October for Cybersecurity Awareness Month , called…
In the modern era of technological advancement, artificial intelligence (AI) is revolutionizing business operations, presenting unparalleled opportunities for efficiency and…
In recent years, video analytics has significantly transformed the interpretation and utilization of visual data. Through advanced algorithms and artificial…
by Dan K. Anderson CEO, CISO, and vCISO With the rise of software supply chain attacks, organizations are under increasing…
A new version of the Qilin ransomware was discovered by cybersecurity researchers. The new version comes with increased sophistication and…
Do you know where all the secrets are? The probable answer to this might be NO and believe me you…
UnitedHealth confirms for the first time that over 100 million people had their personal information and healthcare records stolen during…
Is your organization planning to implement a privileged access management (PAM) solution? If you already have passwords, an anti-virus, and…