Do CISOs Smile?How often do CISOs smile? Not very often. The role is difficult, ambiguous, and chaotic. There are immense pressures and grandiose…2d ago2d ago
Malware Can Hide From Email Scanners in Virtual Hard DrivesThis is an interesting tactic by cyber attackers — using virtual machine hard drive files to bypass email malware filters!Oct 24Oct 24
SEC is Not Accepting Half-TruthsThe SEC has fined four major companies for materially misleading investors regarding cyberattacks.Oct 23Oct 23
Are Leaders Ready to Break the Ransomware CycleIt is good to see US government leaders realize that ransomware is a growing existential threat to our country, at the hands of our…Oct 21Oct 21
The Latest Cybersecurity Vault InterviewsThe most influential cybersecurity experts discuss adversaries, risks, cyber warfare, and supply chain outages on the Cybersecurity…Oct 19Oct 19
Fraudulent Worker Schemes Lead to CyberattacksSecureworks released a report detailing how North Korean attackers are targeting western countries with a new tactic. Attackers are…Oct 18Oct 18
Rising Cyber Aggression from Nation StatesThere are big predators in our digital world. In recent keynotes I have been talking about the big 4 aggressive nation states and how they…Oct 17Oct 17
Deconstructing Ransomware SeriesRansomware attacks are vicious, expensive, impactful, and becoming commonplace. So, let’s take a look at what Ransomware is, how attacks…Oct 17Oct 17
Do CISOs Want to Split Their RoleA recent report by Trellix indicated that due to growing complexity, responsibility, and regulatory accountability, a majority of CISOs…Oct 15Oct 15
Explaining Cybersecurity — Vizitek Interface OverviewExplaining cybersecurity is challenging, but with the right visual interface, it is easier to understand the behavioral, technical, and…Oct 13Oct 13