This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
It’s no secret that we’re facing a critical cybersecurity talent shortage. Despite persistent outcry from security leaders and experts, it’s only getting worse.
Board members are often entrusted with sensitive data and information, which ensures they can be effective in their roles. But if that data gets into the wrong hands, the organization could run into costly legal trouble and reputational damage.
With ransomware and distributed denial of service (DDoS) attacks on the rise, the average number of focused cyberattacks per organization has more than doubled this year compared to the previous 12 months.
Only about half of all countries have a cybersecurity strategy or are in the process of developing one, the International Telecommunication Union reported in its second Global Cybersecurity Index.
Mark Zuckerberg recently made headlines when, in a picture he posted in celebration of an Instagram milestone, it was observed that his laptop’s camera and microphone were taped over in an attempt to mitigate the threat of remote monitoring.
Starting last August, we began the current series of articles to provide our readers with a deep dive into the NIST Framework and its approach to Identify, Protect, Detect, Respond to and Recover from cybersecurity incidents.
The character Don Quixote became legendary tilting at imaginary giants that were ultimately just windmills dotting an expansive countryside. His cause was noble, but his efforts were fruitless and completely misguided.