Home Search

U.S. - search results

If you're not happy with the results, please do another search
Ransomware attacks, LockBit Ransomware

The Wild Evolution of Ransomware

0
This past year, I have spent much time researching and writing about ransomware attacks as well as conducting ransomware simulation exercises. I’ve come across...
ZingBox

Vendor Relationships: Soft Skills for CISOs

0
A CISO has the responsibility of building a solid relationship with their peers and staff. Building this rapport takes time and is built on...
Endpoint Security

Endpoint Security: Protecting Businesses and Remote Workforce in the New Reality

0
Market research institutions and analysts have been predicting the rise of endpoints for years. Analysts project the rise of IoT devices due to 5G...
Bose suffers ransomware attack

Audio Equipment Manufacturer Bose Confirms Data Breach Following Ransomware Attack

0
Organizations globally encountered a series of high-profile ransomware attacks this year.  From the U.S. fuel supplier Colonial Pipeline, laptop maker Acer to affecting Irish health services,...
ransomware, ryuk ransomware, cox media

Ransomware Attacks Will Become More Prevalent in H2 2021: ISACA Survey

0
From the recent Colonial Pipeline attack to the D.C. Metropolitan Police Department and numerous small and medium enterprises (SME), the world has witnessed a...
cyberthreats in health care

Cyberthreats: The Stealthily Spreading Cancer in the Health Care Sector

0
Public health plays a major role in determining the quality of life. As seen during the pandemic, public health and the health care sector...
Top Cybersecurity Jobs in 2021

These are the Top 5 Cybersecurity Jobs in 2021

0
Digital security is becoming more critical than ever with organizations moving towards rapid digital transformation and automation.  Securing valuable data, programs, intellectual property, and...

“I think it’s extremely unproductive to have individual state privacy standards”

0
Armistead Whitney is the Founder and CEO of Apptega, the software platform helping businesses around the world build, manage and report their cybersecurity programs....
Ransomware, supply chain and ransomware

10 Legal Questions You Should Be Asking About Ransomware

0
Data extortion through cyber means is an insidious threat that thousands of companies throughout the world experience firsthand. For many bad actors, it is...
cybersecurity compliance

Corporate Compliance Strategies to Protect Data

0
The pandemic has pushed the corporate workforce to remote locations, which has resulted in increased risk to corporate data. As corporations rise to the...