Some of these webcasts are better than others, but there is a wealth of good information in this post from the team at (ISC)2. Enjoy!
http://blog.isc2.org/isc2_blog/2017/08/top-10-isc%C2%B2-webcasts-of-2017-.html
Some of these webcasts are better than others, but there is a wealth of good information in this post from the team at (ISC)2. Enjoy!
http://blog.isc2.org/isc2_blog/2017/08/top-10-isc%C2%B2-webcasts-of-2017-.html
Though unabashedly sales centric, this blog post by Fortinet provides a good overview of the intentions and goals associated with CIPA (Children’s Internet Protection Act). It is well worth a read as both a parent and a potential technology provider in the K-12 space.
I am thrilled to see these patches approved and moving forward, but we need to reevaluate this process and create a scenario in which security issues can be addressed in a timely manner.
https://www.infosecurity-magazine.com/news/fda-approves-firmware-fix-for-st/
Please be aware of these threats, notify your employees, and train on how to spot these malicious messages.
It is terribly sad that it comes to this during and after every disaster, but there are criminal willing and able to take advantage of those selfless and willing to help. Please be careful when responding to requests for support and focus your energies on trusted entities.
This is a very interesting thought exercise and is relevant to both banks and other business entities. Consider the impact of a smartphone in your environment. Ponder the number of tools and resources it presents its owner, especially if that owner has a malicious intent.
https://www.welivesecurity.com/2017/08/23/smartphone-use-bank/
I am pleased to see this happen and look forward to the day when US Cyber Command stands alone and separate from the NSA in its role as a weapon in the US arsenal against cyber threats.
The mystery of Cyber Insurance is certainly worth solving and this article is a good first step to understanding what an organization does and does not receive when purchasing cyber insurance. It can be an excellent tool in the overall toolbox of cyber attack preparedness, but it is in no way a replacement for sound cybersecurity practices.
https://www.darkreading.com/endpoint/the-pitfalls-of-cyber-insurance/a/d-id/1329656