Guest Blog: Can Our Industry Learn from the Colonial Pipeline Ransomware Attack?

Guest Blog: Can Our Industry Learn from the Colonial Pipeline Ransomware Attack?

Posted by James Saturnio - Ivanti on May 12, 2021

The following post was written by James Saturnio, Senior Lead Technical Market Advisor for the Technical Marketing Engineering team at Ivanti.

Read more

Cybersecurity Leaders Discuss Cross-Border Concerns, Protecting IoT Devices, Ransomware

Cybersecurity Leaders Discuss Cross-Border Concerns, Protecting IoT Devices, Ransomware

Posted by Data Connectors Newsroom on May 11, 2021

Virtual Summit Talks Data Security Requirements for Western Canada in the Wake of Colonial Pipeline Cyber Attack

Read more

Sneak Preview: Security Across Borders with the U.S. Secret Service

Sneak Preview: Security Across Borders with the U.S. Secret Service

Posted by Michael Hiskey on May 11, 2021

The two countries boast the world’s longest land border, but when it comes to cybersecurity, the United States and Canada share so much more.

Read more

SentinelOne Uncovers Dell Vulnerability, Impacting Millions of PCs

SentinelOne Uncovers Dell Vulnerability, Impacting Millions of PCs

Posted by Jen Greco on May 6, 2021

Of course, as a cybersecurity pro, you’re effortlessly on top of all your software and security updates. But it’s been a particularly busy week when it comes to vulnerabilities on […]

Read more

Cybersecurity Leaders Gather Virtually in Atlanta, Gain Insights From Secret Service

Cybersecurity Leaders Gather Virtually in Atlanta, Gain Insights From Secret Service

Posted by Jen Greco on May 3, 2021

Atlanta Information Management Exec Leads Agenda that Includes a Briefing from Digital Forensics Lab, IT Security Innovations The 2021 Atlanta Virtual Cybersecurity Summit provides senior executives in the area education regarding new […]

Read more

Recent news posts

This is a sample blog post title.
Featured Image

Federal Agencies React To Colonial Pipeline, from Mitigating Crisis to Combatting Ransomware Threats

This is a sample blog post title.
Featured Image

Executive Order Seeks Zero Trust Architecture, Improved Cloud Security

This is a sample blog post title.
Featured Image

Cybersecurity Industry Leaders Respond to Colonial Pipeline Ransomware Attack

This is a sample blog post title.
Featured Image

Guest Blog: Can Our Industry Learn from the Colonial Pipeline Ransomware Attack?

This is a sample blog post title.
Featured Image

Cybersecurity Leaders Discuss Cross-Border Concerns, Protecting IoT Devices, Ransomware

Attend an Event!

Connect and collaborate with fellow security innovators at our Virtual Cybersecurity Summits.

Register Today

Page