by John Bruggeman | Feb 23, 2023 | Security
As ransomware attacks become more prevalent, many businesses are turning to cybersecurity insurance to transfer risk and mitigate some of the costs of various cyberattacks. Those negative effects are enough to give even the most confident CEO and CIO pause—a...
by Chris Munoz | Jan 26, 2023 | Security
Various means of supply chain optimization have evolved through cloud computing technologies to combat malware threats. In addition, the Cloud offers valuable solutions for updating internal infrastructure and optimizing supply chains. What is supply chain...
by John Bruggeman | Dec 21, 2022 | Security
According to Microsoft’s X-Force Threat Intelligence Index 2022, phishing attacks—which rely on human error and deception—cause 40% of all data breaches. Contrary to popular belief, few cyber-attacks solely consist of technology-based malware. Instead, experts...
by John Bruggeman | Nov 15, 2022 | Security
Tech bills before America’s Congress, NIST announces quantum cryptography algorithms, and Lockdown mode is coming to Apple iOS 16 Three recent developments in security technologies have created ripples in the IT world with effects that could be felt well into...
by Ryan Hamrick | Oct 24, 2022 | Security
The SBOM is an essential tool in cyber defense and compliance management What is a Software Bill of Materials? A bill of materials (BOM) is a concept from physical supply chains. In essence, it’s a receipt on steroids. A BOM lists identifying information about...
by John Bruggeman | Oct 21, 2022 | Security
How concepts from the CIA Triad affect personal information Information security and information privacy defined While it may be easy to conflate the two, information privacy is not the same as information security. For information security professionals, the...