By
Guest Contributor
Published: 30 Aug 2023
In light of recent Securities and Exchange Commission regulations governing the disclosure of cyber...
By
Guest Contributor
Published: 30 Aug 2023
In light of recent Securities and Exchange Commission regulations governing the disclosure of cyber...
Ransomware is one of the most effective strategies for attacking businesses, critical infrastructure and individuals. This type of malware infects computers...
More than two decades after the advent of the cloud computing era, CrowdStrike still sees too many organizations making too many unforced errors.
Elia...
When a Russia-sponsored social engineering cyberattack targeted Microsoft Teams users in media, tech, government and other sectors earlier this summer...
What is ISACA?
ISACA is an independent, nonprofit, global association that engages in the development, adoption and use of globally acceptedinformation...
To go paperless or speed up confirmation of legal and business agreements, organizations have long relied on digital signatures.
The market for digital...
What is BYOI (bring your own identity)?
BYOI (bring your own identity) is an approach to digital authentication in which an end user’s username and...
What is risk analysis?
Risk analysis is the process of identifying and analyzing potential issues that could negatively impact key business initiatives or...
After years of transparency issues, bypassed patches and rocky communication practices with the security community, infosec professionals say Microsoft...
Every organization must take business risks to be successful. The role of enterprise risk management is to identify, assess and control those risks to...