During talks and presentations people often ask me how do I remember so many names, different “artifacts” (a.k.a Malware) and...
Data and computer security
Data and computer security
Russia Bans Foreign Messaging Apps in Government OrganizationsCybercriminals Targeting Law Firms with GootLoader and FakeUpdates MalwareParallax RAT Targeting Cryptocurrency Firms...
Being a security leader in the modern digital world is more challenging than ever. Businesses face a never-ending barrage of...
China Is Relentlessly Hacking Its NeighborsTikTok Answers Three Big Cybersecurity Fears About the AppU.S. Gov’t Agencies Have 30 Days to...
U.S. Marshals Service Investigating Ransomware Attack, Data TheftCISA Tells Agencies What to Prioritize to Meet Cybersecurity Log MandateAustralia Plans to...
A paper expanding on greater ability to intervene during hacks – especially on private companies – causes alarm among Coalition...
CISA Calls For Increased Vigilance One Year After Ukraine’s Russian InvasionRussian IT “Brain Drain” Decentralizes CybercrimePentagon Investigating Two-Week Email Server...
SECURITY POLICY- The essence of an IT security- policy is to establish guidelines and standards for accessing the organization’s information...
Automating Third-Party Patching As a CISO, speaker, author, or security advisor I keep getting the same question again and again....
GISEC 2023 With the ever-changing global landscape, it is increasingly essential to strengthen cybersecurity across industries. GISEC Global offers a...