ZoomInfo, provider of intelligence solutions, announced the expansion of its privacy team with Bubba Nunnery as Senior Director of Privacy and Public Policy. The privacy team is tasked with delivering...
The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have released a Joint Cybersecurity Advisory (CSA) to address recently disclosed vulnerabilities in Microsoft Exchange Server....
What began just a few years ago as an organic, gradual, and sometimes cautious migration of communications, operations, and data to the virtual world of online...
Identity management has become a focal point for enterprise security. With the 2020 COVID-19 pandemic and the scramble to support work-from-home employees, the real threat to...
Researchers from the Counter Threat Unit (CTU) at Secureworks have discovered a possible link to China while examining how SolarWinds servers were used to deploy malware. In late 2020, Secureworks CTU researchers observed...
Hybrid work is emerging as a norm, especially for companies who have a mix of workers whose job requires coming into the office, and those who...
Veritas Technologies revealed new research that highlights the dangers of mis-using instant messaging (IM) and business collaboration tools: 71% of office workers globally – including 68%...
The new year is upon us, and as such, it is a time to reflect on what worked over the past 12 months, and more importantly,...
At least 30,000 organizations in the U.S. have been hacked by a Chinese cyber espionage unit, known as “Hafnium.” The group is targeting and exploiting security...
The Unofficial Law of Endpoint Security Proportionality: The security measures taken to protect an employee’s endpoint are proportionate to the proximity of the employee to the company’s...
Recent Comments