The California Consumer Privacy Act (CCPA) has been around since 2018, as the more protective data privacy legislation of any state, but not all businesses have been acting ethically in their compliance and respect for user privacy.
As a result, the
The California Consumer Privacy Act (CCPA) has been around since 2018, as the more protective data privacy legislation of any state, but not all businesses have been acting ethically in their compliance and respect for user privacy.
As a result, the
October is Cybersecurity Awareness Month. It is a time to consider the risks we accept everyday when using computers and what we can do to better protect ourselves.
I have a challenge for each and every person. Something that will help people indiv
The U.S. National Security Agency knows which vulnerabilities China backed hackers are exploiting the most to gain access to sensitive data.
The Chinese state-sponsored information gathering engine is a vacuum when it comes to acquiring information fr
"Why Sacramento is Ripe to be a Cybersecurity Hub" panel discussion, was lively and engaging. Moderated by Carmen Marsh and featuring Malcolm Harkins, Matthew Rosenquist, and George Usi, the panel discussed a broad range of topics including: Why pick
While creating a recent presentation, I needed a slide on “threat detection is hard.” And it got me thinking, why is threat detection so hard for so many organizations today? We can trace the “cyber” threat detection to 1986 (“Cuckoo’s Egg”) and 1987
The U.S. Department of Justice filed charges against six Russian agents, identified as members of the APT group known as Sandworm. The unsealed documents reveal that the six suspects are all current or have former ties to the Russian foreign intelli
New phishing malware leverages Artificial Intelligence and worm functionality to rapidly spread to contacts of victims. By leveraging previously established relationships the malware can bypass technical controls and easily fool new targets into bec
Recent verified reports highlight exploitable vulnerabilities in Apple’s security chip that cannot be patched! The announcement adds to the growing concerns and shifting perceptions about hardware security.
Hardware-based security has pros and cons.
Security experts say don't pay ransomware, but now the U.S. Treasury Department is now declaring it illegal! Every company on the Internet must deal with the threat and emerging regulations.
Ransomware continues to be a growing problem because vict
This report summarises the top breaches between mid – September till 15th October 2020. The report will help you to keep track of the latest hacks and add insights to safeguard your organization by looking at the trends.
Microsoft and partners have taken down the Trickbot ransomware infrastructure. That is a temporary relief, as the cybercriminals will soon adapt. The bigger picture is how the Microsoft Digital Crimes Unit (DCU) has created a template and partnership
Boston October 14, 2020 - FireCompass today unveils its new artificial intelligence-powered Continuous Automated Red Teaming (CART) platform that mimics thousands of hackers trying to break into an organization. The solution enables organizations to
We had some very amazing sessions at CISO Platform Virtual Summit 2020, and based on community demands we are bringing this recorded session from the summit.
Key Points To Be Discussed
Does society want governments to take on the role of protecting the Internet? Should the Internet be considered a Critical Infrastructure and therefore be overseen by governments? Will such actions undermine privacy and liberty or will it be demanded
We had some very amazing sessions at CISO Platform Virtual Summit 2020, and based on community demands we are bringing this recorded session from the summit.
Key Points To Be Discussed
With the evolving threat landscape, breaches are becoming increasingly common. As per Ponemon Institute, in 2017, the average time required to detect a breach was 191 days and the average time required to contain a breach was 66 days. These time fram
Frequently Compared DLP Products
Frequently Compared CASB Products
Frequently Compared EDR Products
Are You Comparing Products Correctly?
Compare EDR Vendors across feature
Frequently Compared EDR Products
Are You Comparing Products Correctly?
Compare EDR Vendors across feature