Costa Rica Ransomware Attack Continues to Plague Citizens

Costa Rica Ransomware Attack Continues to Plague Citizens

Posted by Jen Greco on Jul 1, 2022

It’s a story that should leave the entire international community worried. Costa Rica has been crippled by two cyberattacks stemming from Conti, one of Russia’s most notorious ransomware gangs.

Read more

Scaling, Improving and Automating Your GRC Strategy

Scaling, Improving and Automating Your GRC Strategy

Posted by Jen Greco on Jun 16, 2022

Whether you’re running a mom-and-pop shop or a multi-national corporation, you can always approach a Governance, Risk and Compliance (GRC) program to effectively protect your organization. The key, according to […]

Read more

CISA Issues Emergency Directive 22-03, Encourages VMware Updates

CISA Issues Emergency Directive 22-03, Encourages VMware Updates

Posted by Jen Greco on May 24, 2022

The Cybersecurity and Infrastructure Security Agency (CISA) issued a rare emergency directive instructing organizations to react swiftly to mitigate the actions of threat actors exploiting vulnerabilities in VMware products.

Read more

Cloud Computing, Data Protection Top List of In-Demand Skills: ISACA Annual Report

Cloud Computing, Data Protection Top List of In-Demand Skills: ISACA Annual Report

Posted by Jen Greco on Apr 14, 2022

ISACA’s annual report, The State of Cybersecurity 2022, offers an exclusive look at the way cybersecurity professionals interact with their organizations and careers. This year, the 2,031 surveyed, cited a […]

Read more

Cyber Preparedness Consortium Bill Heading to President’s Desk

Cyber Preparedness Consortium Bill Heading to President’s Desk

Posted by Jen Greco on Apr 11, 2022

Though hard to fathom these days, the US Senate has passed a bill with unanimous consent this week: the National Cybersecurity Preparedness Consortium Act – just about pushing the bill […]

Read more

Recent news posts

This is a sample blog post title.
Featured Image

Cybersecurity Trends in 2023: What Do the Experts Say?

This is a sample blog post title.
Featured Image

Twitter’s New Ownership Sparks Changes to Security Structure

This is a sample blog post title.
Featured Image

Latin America Cyber Community Challenges Fast-Growing Threat Landscape

This is a sample blog post title.
Featured Image

Third-Party Threats Pose Problems for Healthcare Sector

This is a sample blog post title.
Featured Image

CISA, FBI Cite No Specific Cybersecurity Threat to Midterm Elections

Attend an Event!

Connect and collaborate with fellow security innovators at our Virtual Cybersecurity Summits.

Register Today

Page