Can the Texas Power Grid Stand Up Against Cyber Attacks?

Can the Texas Power Grid Stand Up Against Cyber Attacks?

Posted by Jen Greco on Sep 27, 2022

There’s death and taxes, sure. But if you’re a Texan, there’s also complaints about ERCOT during bouts of extreme weather.

Read more

Uber Breached as Former Security Chief Goes to Trial

Uber Breached as Former Security Chief Goes to Trial

Posted by Jen Greco on Sep 21, 2022

Just over a decade ago, the idea of jumping into a random stranger’s car (who you found on the Internet) sounded like a major faux pas in personal security.

Read more

Marketing and Security Teams Unite Under BIMI

Marketing and Security Teams Unite Under BIMI

Posted by Jen Greco on Aug 26, 2022

It’s not often that you find something both marketing and security teams will find equally exciting – but then, BIMI happened.

Read more

Pelosi Visit to Taiwan Catalyzes Extensive Cyberattacks

Pelosi Visit to Taiwan Catalyzes Extensive Cyberattacks

Posted by Jen Greco on Aug 4, 2022

Chinese officials have had some not-so-nice things to say regarding Speaker of the House Nancy Pelosi’s recent visit to Taiwan – and the local convenience stores, train stations, and public […]

Read more

Privacy Update: What States are Enacting Privacy Legislation in 2022?

Privacy Update: What States are Enacting Privacy Legislation in 2022?

Posted by Jen Greco on Jul 8, 2022

Organizations now have less than a year to become compliant with the requirements of the Colorado Privacy Act and the Connecticut Data Privacy Act — they’re due to become effective […]

Read more

Recent news posts

This is a sample blog post title.
Featured Image

Can the Texas Power Grid Stand Up Against Cyber Attacks?

This is a sample blog post title.
Featured Image

The End User: Tales from the Cyber-Adjacent

This is a sample blog post title.
Featured Image

Uber Breached as Former Security Chief Goes to Trial

This is a sample blog post title.
Featured Image

Recent Attacks Highlight a Growing Threat Landscape for Latin America

This is a sample blog post title.
Featured Image

Security, Marketing Experts Connect Through Email Authentication Tools in Upcoming Webinar

Attend an Event!

Connect and collaborate with fellow security innovators at our Virtual Cybersecurity Summits.

Register Today

Page