Everything as a Service (XaaS) has taken the cybersecurity field by storm, with enterprise organizations outsourcing security and development functions to third parties, including Software as...
2021 heralded a year of record cyberattacks, with the Identity Theft Resource Center (ITRC) reporting that the number of data breaches publicly reported so far this year has...
ISO 20000 defines the objective of incident management (part 1, 8.2) as: To restore agreed service to the business as soon as possible or to respond...
Cyentia Institute and RiskRecon, a Mastercard company, released research that quantifies how a multi-party data breach impacts many other organizations in today’s interconnected digital world. The...
No business or organization wants to be the victim of a cybersecurity attack. Adversaries target organizations of all sizes and in every industry, so cyber security...
APT29, known as Cozy Bear, has allegedly breached the computer systems of the Republican National Committee (RNC), according to reports. APT29, which has been linked to Russia’s...
Threat actors have successfully targeted defense contractors over the years because they haven’t fully secured their networks, thus creating serious vulnerabilities in U.S. national security. To...
Recent Comments