Ransomware attacks and data breaches have taken over the news cycle recently, putting executives and the C-suite in the spotlight as primary targets and victims. As...
A company’s ability to keep data safe can directly affect whether customers trust the organization and remain loyal over time. According to Shred-it’s 2021 Data Protection Report,...
2021 heralded a year of record cyberattacks, with the Identity Theft Resource Center (ITRC) reporting that the number of data breaches publicly reported so far this year has...
A ransomware attack is a destructive and costly cybersecurity incident. Your company can improve its preparedness and response by conducting tabletop exercises, which test whether your...
Breaches are on the rise, and so are their costs! The network is the highway upon which all your IT infrastructure rides. Attacks traverse these paths — too...
Devo Technology announced the results of its 3rd annual SOC Performance Report (SPR), a survey on the current state of security operations center (SOC) performance, conducted by...
Threat actors are actively exploiting a critical security flaw in Java logging library Apache Log4j. Log4j is an open-source, Java-based logging utility widely used by enterprise...
It feels like IT and security pros are tasked with the impossible job of operating business-critical applications in Infrastructure as a Service (IaaS) environments in the...
At the start of 2020, businesses set out to execute on the well-laid, carefully thought out plans they’d spent months developing. But just a little over...
How do cybersecurity and executive leaders communicate about ransomware? A new (ISC)² study, “Ransomware in the C-Suite: What Cybersecurity Leaders Need to Know About What Executives Need to...
Recent Comments