This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
A survey by IDC and Zerto, "The State of Ransomware and Disaster Preparedness: 2022," found that 93% of North American and Western European medium and large organizations have experienced a business disruption due to data issues in the past twelve months.
A study from General Dynamics Information Technology (GDIT) measured zero trust maturity in federal agencies since the Executive Order on Improving the Nation's Cybersecurity was released in May 2021.
Cybersecurity agencies have observed an increase in malicious cyber activity targeting managed service providers (MSPs) and expect this trend to continue.
Iranian APT known as Cobalt Mirage focuses on ransomware attacks against U.S. targets for financial gain, according to Secureworks threat intelligence.
Joseph "Rich" Baich brings years of military and private sector security experience to his new Chief Information Security Officer (CISO) role at the Central Intelligence Agency (CIA).
The Port of Vancouver USA has partnered with the Maritime Transportation System Information Sharing and Analysis Center (MTS-ISAC) to launch the Lower Columbia River Maritime Information Exchange (LCR-MIX), hardening the port system against cyberattacks.
What are the tools and processes necessary to develop a comprehensive security program into a mature vulnerability assessment and risk management program?