During cybersecurity awareness month, we are showcasing several podcasts on security and privacy issues. In this podcast, I share a personal experience with, and an in-depth analysis of, a sophisticated phishing scam. How can companies protect themselves against increasingly elaborate phishing attempts and other malicious actions? Listen to the story here.
You may also like
FAQs for Interpreting the PIPEDREAM Malware
In response to the U.S. government’s Joint Cybersecurity Advisory on APT Cyber Tools Targeting ICS/SCADA Devices, we have compiled a list of the most frequently asked questions we are receiving from clients and the strategies we are seeing pursued...
Quantitative Cyber Risk Management 101: Baselining and Baseline Cycling
Cyber risk is a growing threat to organizations of all shapes and sizes. Cyber risk quantification allows organizations to better understand the financial impact that these risks pose; however, setting the scope of quantification activities and...
How to Talk to Boards About Ransomware And Risk
Anyone who follows the news is already aware of the persistent threat of ransomware events. Board members are certainly aware, and they know what preparations their organizations are making to fend off, respond to and recover from ransomware attacks...
Subscribe to Topics
Recent Posts
- Planning A Successful Dynamics 365 CE Solution Delivery
- FAQs for Interpreting the PIPEDREAM Malware
- Embedded Analytics: Make Data the Highlight of Your Next Dinner Party
- A CISO’s First 100 Days (Part 2): Why Organizations Replace Their CISO . . . And Why It Matters
- 7 Considerations for Maximizing ROI on AI/ML Investments
Categories
- 2021 Tech Priorities
- Applications
- Business Continuity and Resilience
- CIO Tech Transformation Series
- CISO Next
- Cloud
- Consumer Products and Services
- COVID-19
- Cybersecurity
- Data and Analytics
- Emerging Technologies
- Energy and Utilities
- Finance
- Finance Transformation
- Healthcare
- How To
- Manufacturing and Distribution
- Microsoft
- Nintex
- Oracle
- Privacy
- Risk and Compliance
- SAP
- Security
- Tech Transformation
- Technology, Media & Telecom
- Vulnerability/Incidents
- Workday