News & Updates
No items found.
Roger Hale named Chief Security Officer at Agora

Roger Hale named Chief Security Officer at Agora

As Chief Security Officer at Agora, Hale will work to  navigate compliance and security, and determine risk management and cybersecurity best practices. 

Read More

Dave Maynor named Senior Director of Threat Intelligence at Cybrary

Dave Maynor named Senior Director of Threat Intelligence at Cybrary

David “Dave” Maynor has been appointed Senior Director of Threat Intelligence at Cybrary, leading the new Cybrary Threat Intelligence Group (CTIG). 

Read More

Identity-based attacks the top cyber threat in 2021

Identity-based attacks the top cyber threat in 2021

Among ransomware, software supply chain attacks and data breaches, a Blumira report found that identity-based attacks are the top threat organizations faced in 2021. 

Read More

Exploring the connections with cybersecurity and coding

Exploring the connections with cybersecurity and coding

Low-code software doesn’t need to mean higher security risk. It simply means more education, rigorous app testing, and appropriate security policies around citizen development. 

Read More

ISC StormCast for Tuesday, May 24th, 2022
CISA outlines 10 initial access points exploited by hackers

CISA outlines 10 initial access points exploited by hackers

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an alert listing 10 common initial access exploits for cybercriminals.

Read More

Artificial intelligence investment grows, but barriers remain

Artificial intelligence investment grows, but barriers remain

More than one-third of organizations are using AI to address skills and labor shortages and respond to competitive and environmental pressures, according to new IBM research.

Read More

Christopher Hoff joins LastPass as Chief Secure Technology Officer

Christopher Hoff joins LastPass as Chief Secure Technology Officer

As Chief Secure Technology Officer, Christopher Hoff will be responsible for the company’s technological innovation and security infrastructure.  

Read More

The do’s and don’ts of communicating a data breach

The do’s and don’ts of communicating a data breach

There are three key elements to implementing a successful data breach communication strategy; an incident response plan, consistent communication, and transparency. 

Read More

Load More