Software today is rarely completely made of first-party code, and is more often “assembled” from […]
3rd Party Risk Management , Fraud Management & Cybercrime , Governance & Risk Management Ransomware […]
Governance & Risk Management , Incident & Breach Response , Leadership & Executive Communication If […]
Fraud Management & Cybercrime , Ransomware Organized ransomware groups like DarkSide and REvil consistently bypass […]
Critical Infrastructure Security , Cybercrime , Cybercrime as-a-service Several characteristics of the Hive ransomware group […]
Cryptocurrency Fraud , Fraud Management & Cybercrime A new report from the U.S. Department of […]
3rd Party Risk Management , Cloud Security , Critical Infrastructure Security Chronic disease management firm […]
Covering topics in risk management, compliance, fraud, and information security.By submitting this form you agree […]
Critical Infrastructure Security , Cybercrime , Endpoint Security Ransomware-wielding attackers continue to seek victims who […]
Covering topics in risk management, compliance, fraud, and information security.By submitting this form you agree […]
Application Security , Cloud Security , Governance & Risk Management New technologies such as artificial […]
Covering topics in risk management, compliance, fraud, and information security.By submitting this form you agree […]
Covering topics in risk management, compliance, fraud, and information security.By submitting this form you agree […]
Critical Infrastructure Security , Cybercrime , Cybercrime as-a-service You know the people who will chat […]
Breach Notification , Critical Infrastructure Security , Cybercrime Why do so many HIPAA-covered entities and […]
Advanced SOC Operations / CSOC , Next-Generation Technologies & Secure Development , Security Information & […]
Application Security , Next-Generation Technologies & Secure Development Two researchers from the University of Cambridge […]
3rd Party Risk Management , Business Continuity Management / Disaster Recovery , Critical Infrastructure Security […]
3rd Party Risk Management , Business Continuity Management / Disaster Recovery , Critical Infrastructure Security […]