Hackers Want Your Stimulus Check. Here’s How They’ll Try to Get It.

Hackers Want Your Stimulus Check. Here’s How They’ll Try to Get It.

Posted by Jen Greco on Dec 30, 2020

Regardless of your political take on those $600 stimulus checks (that may already be in some people’s accounts, per Treasury Secretary Steve Mnuchin), there’s one thing everyone can agree on: […]

Read more

Best of the Worst: 2020’s Top Data Breaches

Best of the Worst: 2020’s Top Data Breaches

Posted by Jen Greco on Dec 30, 2020

It just feels pretty safe to say that 2020 wasn’t a great year for anyone. That is, of course, unless you’re a wiley hacker who is now rolling in piles […]

Read more

CCPA and CPRA 2.0: Navigate the California Compliance Alphabet Soup

CCPA and CPRA 2.0: Navigate the California Compliance Alphabet Soup

Posted by Jen Greco on Dec 8, 2020

Finally — 2020 is almost over. But before you breathe that sigh of relief, ask yourself: Am I prepared for the impending changes to privacy compliance laws? Whether you’re a […]

Read more

Interview: EJ Hilbert on the Post-Pandemic Threat Landscape

Interview: EJ Hilbert on the Post-Pandemic Threat Landscape

Posted by Jen Greco on Sep 30, 2020

Since COVID19 took over the national conversation in March, the world has changed in unprecedented ways. But what does life look like after the pandemic is behind us? What are […]

Read more

The Dire Consequences of the Cybersecurity Skills Gap

The Dire Consequences of the Cybersecurity Skills Gap

Posted by Jen Greco on Sep 23, 2020

Our friends at ISC^2 have competed their 2020 Cybersecurity Perception study. And if it teaches us anything, it’s that cybersecurity is a pretty darn great career path – just not […]

Read more

Recent news posts

This is a sample blog post title.
Featured Image

Latin America Cyber Community Challenges Fast-Growing Threat Landscape

This is a sample blog post title.
Featured Image

Third-Party Threats Pose Problems for Healthcare Sector

This is a sample blog post title.
Featured Image

CISA, FBI Cite No Specific Cybersecurity Threat to Midterm Elections

This is a sample blog post title.
Featured Image

Atlanta Keynote Highlights: Hadas Cassorla

This is a sample blog post title.
Featured Image

Russian Hackers Hit Colorado, Mississippi State Websites

Attend an Event!

Connect and collaborate with fellow security innovators at our Virtual Cybersecurity Summits.

Register Today

Page