Against this backdrop of average data breach costs ($3.86 million), the data reported shows a clear advantage in favor of...
Posts
It appears that there could be what one leading investigative reporter has called “an extraordinarily serious security vulnerability” in a...
Although there has never been an official term defined, Risk Management (RM) is explained by the Economic times as ‘the...
Kuwait, Saudi Arabia, Sudan, and Ethiopia all felt major effects from last week's cut of the so-called Falcon cable, which...
“Inherent vs. residual risk” is more accurately phrased “inherent and residual risk,” as the two concepts go hand in hand....
In business continuity, there are anywhere from 5 to 10 measures that are commonly regarded as the key mitigation controls....
Just two days after releasing Firefox 72, Mozilla has issued an update to patch a critical zero-day flaw. Article Link
In April of 2019, Pulse Secure issued an urgent patch to a vulnerability in its popular corporate VPN software—a vulnerability...
The FFIEC just updated its Information Technology Examination Handbook (IT Handbook) booklet on business continuity planning, and it’s got a...
“It was the final straw for a lot of employees. All of the stores across the country were affected by...