What could you buy with $20 billion dollars? PC Magazine investigated this question a few years ago and the results were interesting. $20 billion dollars could buy you... Learn More
At least 3.4 billion fake emails are sent every day as phishing attacks continue to grow and evolve into more sophisticated schemes. Cities, increasingly a target for ransom... Learn More
By Herb Schreib Microsoft will end extended support for SQL Server 2008 on July 9, 2019. For many organizations, that means the clock is running out and it’s time to... Learn More
A guide to help Financial Institutions and Technology Service Providers achieve their business continuity objectives By John Beattie In April 2019, the FDIC released ... Learn More
With the tech sector booming and unemployment low, cybersecurity talent can be hard to recruit and retain. The implications for business resilience are particularly... Learn More
By Asher DeMetz The United States consists of 16 critical infrastructure sectors – communications, financial services, energy, emergency services, information... Learn More
When people turn 50, they sometimes do unusual things to celebrate the event. The Huffington Post published a list of things everyone should experience at least once... Learn More
Earlier this summer the GDPR, or General Data Protection Regulation, superseded the European Data Protection Directive (EDPD) to become the new keystone of data... Learn More
What is the price of network security? If your company understands we live in an interconnected world where cyber threats are continuously growing and developing, no... Learn More
By Nick Bianco Cybersecurity can be a magnet for myths. Attacks emerge and cripple systems availability or swipe data quickly and unexpectedly. It happens so fast that... Learn More
Sandra Bell Data breaches can trigger fines, deflate stock prices, irreparably damage reputations, lose customers and attract more cyberattacks. But they don’t have to. Learn More
When CentaurWipe infected hundreds of companies in December 2016, IT departments were left flat-footed. Named for its dual attack of locking down devices while systematically... Learn More