Our journey through the factors that make up organizational cyber resilience is almost complete. It’s time to put the puzzle pieces together. First, a quick look at the issues we’ve covered so far. The Human Factor Business Continuity Disaster Recovery Crisis Management Governance Testing and Training Privacy Security By Design…
Read More
Threat actors put various cloud “tools” — resources like account information and application access — for sale on dark web markets that provide access for conducting follow-up attacks. But none of those utilities compare in popularity to Remote Desktop Protocol (RDP) accounts. They represent more than 70% of cloud resources…
Read More
You’d have to look far and wide to find an IT professional who isn’t aware of (and probably responding to) the Log4Shell vulnerability. The Operational Technology (OT) sector is no exception, yet the exact exposure the vulnerability poses to OT technology is yet to be fully uncovered. The vulnerability was…
Read More
Data breaches come at such a fast pace that the public doesn’t seem to pay attention to the latest incidents, or they’re practically forgotten in a week — just in time for the next breach to make headlines. Instead of cries for better personal data protection, however, consumers seem less…
Read More