Sean Patrick Butler, GC at @Meraki, Talks w/ @HsuUntied About His Homelife Off the Urban Grid
Ransomware/Malware Activity - Twitter Confirms Data Breach Affecting 5.4 Million Account Profiles - On August 5, 2022, Twitter confirmed it has suffered a data breach after receiving a report of a vulnerability through...more
As defined by Gartner, Shadow IT refers to IT devices, software and services outside the ownership or control of information technology (IT) organizations. These are any IT projects that are managed outside of – and...more
CYBERSECURITY - Cisco/Talos Researchers Find Attackers Using Slack and Discord to Distribute Malware - Another example of the resiliency and creativity of cyber-attackers is outlined in a new blog by Cisco/Talos...more
As we hold our breaths at the opening bell to see if last week’s volatility continues, we consider the impact of computer-driven index funds on that market rollercoaster....more
Cisco is warning customers using its Adaptive Security Appliance (ASA) software about a virtual private network (VPN) bug that could "allow an unauthenticated, remote attacker to cause a reload of the affected system or to...more
We continue to try to alert our clients about the changing threat landscape in cybersecurity. We keep saying how the threats are becoming more and more sophisticated and more and more frequent, and that companies must...more
Protecting Trade Secrets in the Era of the Data Breach - The prevalence of data breaches cannot be ignored. New data breaches continue to occur one after an-other. In the first half of 2015 alone there were reports of...more