DoD Cyber: A Conversation with Melissa Vice, COO for DoD’s Vulnerability Disclosure Program
In the aftermath of what could be one of the most widespread global information technology outages in history, organizations are putting a renewed focus on combating old vulnerabilities that can have cascading effects. ...more
In the continuously evolving landscape of cyber threats, organizations must be proactive in identifying and mitigating potential risks to their digital assets and operations. A critical step in building cyber resilience is...more
Tired of drowning in a sea of paperwork? Frustrated with the endless hours spent sifting through stacks of forms? It’s time to leave the old, cumbersome ways behind and embrace the power of digital transformation. Yes, we’re...more
Malicious Android Apps Used to Target Iranian Banks - An ongoing Android malware campaign targeting users of Iranian financial institutions has expanded to include new abilities to target an even greater number of people...more
Senators Focus Attention on Litigation Funding’s Opacity - Building on the momentum we previously noted related to litigation funding, on September 14, Senator John Kennedy introduced the Protecting Our Courts from Foreign...more
In the first part of Risk Management 101, we focused on the foundational elements of risk management. In part two, we’ll look at how the people who keep your organization running, with their unique insights, skills and...more
EPA Aims to Mitigate Risk of Cyberattack on Public Water Systems On March 3, 2023, the U.S. Environmental Protection Agency (EPA) issued its Memorandum Addressing Public Water System (PWS) Cybersecurity in Sanitary Surveys or...more
The US Department of Justice (DOJ) now has more ammunition and resources than ever to use data analytics in their investigations. The convergence of better technology, increasingly usable data sets, and the ripe combination...more
Today we consider the 1940’s film, The Mummy’s Hand as the second installment in Universal Pictures series featuring this creature. Boris Karloff departed the role and it was taken over for one film by Tom Tyler, who was...more
All organizations, including financial institutions, continue to face significant security threats across their wide ranging IT systems. Such organizations are particularly vulnerable if they cannot track networked devices...more