A government investigation has revealed more detail on the impact and causes of a recent AT&T outage that happened immediately...
Technology Management
As it turned out, a partner of the company had its personal device compromised, and used by the threat actors...
The amendments will become effective 60 days after publication in the Federal Register. Larger entities will have 18 months after...
The threat actor behind the recent Dell data breach revealed they scraped information of 49 million customer records using an...
It's important to keep in mind that recovering from an attack is not the same as disaster recovery or business...
The phishing kit is also evolving, with updates to Tycoon 2FA in February said to have enhanced its capabilities by...
Throughout CSF 2.0, NIST recommendations dovetail with SaaS security needs. Govern, the new function, addresses issues relating to the democratization...
In a tabletop exercise, a team discusses their roles and responses during an emergency under different scenarios, typically with someone...
Compared to the traditional IT security model, which presumes that everything and everyone on the network is trusted, the zero-trust...
The White House Office of the National Cyber Director (ONCD), in a report released Monday, called on developers to reduce...