Meeting compliance requirements can challenge small businesses without on-staff expertise. Here are three things you can do to help.
Posts Tagged: cybersecurity
Like lethal strikes carried out by the Serengetti’s deadly predators, ransomware attacks often unfold quickly, stealthily and with great harm to victims. That’s because beasts of prey, whether equipped with claw and fang or malicious malware, exploit a pack’s weakest links. They prey on the careless and the naive, the ones who stray from theRead… Read more »
After building the program for three quarters, seeking feedback from the stakeholders and making course corrections, a CISO should look forward.
The COVID-19 pandemic has forced both government and higher education to think more about remote data and other cybersecurity concerns.
Responsible for carrying out the election were not just poll workers and election officials, but thousands of IT staffers around the country who defended against cyberattacks.
Authentication factors don’t govern security; the authentication infrastructure determines security. So what’s with all the “killing passwords” talk?
The first 90 days are crucial for establishing credibility as a chief information security officer, or CISO, at an agency.
Even with the sudden shift of circumstance, security experts had already foreseen the eventual need for distributed, remotely applied security.
In the wake of massive computer advancements, why are humans still the ones being asked to generate, know and reveal passwords?
We’ve compiled a list of five killer resources you can use to help protect your agency from whatever witches, zombies and goblins may come your way.