In a recent ITWC briefing, Roger A. Grimes, Data-Driven Defense Evangelist, KnowBe4, said there are many types of email attack being employed by hackers...
By Kevin Magee, Chief Security and Compliance Officer for Microsoft Canada
2020 has brought about major disruptions to both our physical and digital worlds. It...
By Matthew Chiodi, Chief Security Officer, public cloud at Palo Alto Networks Â
Enterprises have been enjoying the flexibility and torrent of innovation that public...
Because credential stuffing is still no one’s responsibility at many organizations, it will almost certainly continue to be profitable for the attacker, according to a report from Akamai
At a time of nonstop technological shift and churn, of terraforming and re-terraforming in cyber security, agility and the ability to improvise and pull...