LendingHome, a real estate loan provider, has named Carrie Weber their new Chief Risk Officer. Weber will develop a risk management strategy for the firm and oversee risk and compliance issues.
The recent pandemic accelerated a trend towards remote work that has been ongoing for years and, as a result, accelerated usage of cloud-based collaboration platforms and their impact on the field of digital forensics. This article will discuss the trends and challenges associated with these platforms as they pertain to cloud-based data collection and its use in forensic investigations.
We spend a lot of time and effort so we can spot attackers —
and for a good reason! But without visibility into our own organizations, we’re left with too much uncertainty. So how can you use more visibility to counter the fog of war?
In this installment of the Cybersecurity and Geopolitical Podcast, Ian Thornton-Trump (CISO at Cyjax) and Tristan de Souza retrospectively look at the inaugural International Cyber Expo in London, discussing data breaches, the role of a CISO and more.
The Identity Theft Resource Center's data breach analysis for the third quarter of 2021 has been released, highlighting an uptick in breaches compared to the first half of the year. The U.S. is set to break its own record for most data breaches in a year in 2021.
A recent surge in cyberattacks, including SolarWinds and Colonial Pipeline, has intensified a focus on cybersecurity across industrial sectors and critical infrastructure. As a result, the U.S. government and other organizations within the nation’s defense supply chain have taken action to protect the critical assets and organizations that ensure the security and prosperity of our country.
Like many other security processes, penetration testing and threat hunting are often incorrectly equated. However, the difference between the two is that between prevention and detection.
Two school district technology leaders share their first-hand experiences and insights into the cybersecurity vulnerabilities affecting the K-12 sector, along with how to design a security roadmap and the challenges that come along with implementing one.
In emergencies such as a natural disaster, industrial accident, IT service disruptions or facility intrusion, delivering important messages with real-time speed while collecting situational feedback can save lives and keep critical business operations running. Enter mass notification technology. Here, we explore a sampling of the latest mass notification solutions.