Incident Response: We’ve Been Breached – Now What?
It’s a common scenario and one every enterprise should be ready for: you’ve just learned your business has experienced a data incident, now what? However
It’s a common scenario and one every enterprise should be ready for: you’ve just learned your business has experienced a data incident, now what? However
COVID-19 is still with us, however many enterprises are reopening their doors and attempting to return to some sense of normal. It’s certainly a new
Stop waiting. Nothing is more critical during a security investigation (incident response, or “IR”) than the quality of the information coming from your log sources.
The Cyber Security Implications of the Coronavirus As the fear of the Coronavirus – COVID-19 – spreads, governments and companies are looking for containment strategies
In the past few weeks, 5 law firms reported ransomware attacks by a malicious group known as Maze. This new and unique virus doesn’t follow
Years ago, I served as Head of Information Security for a large organization. After just 6 months on the job, we experienced every network administrator’s
You’ve read about it for months now, and it’s finally here. The California Consumer Protection Act went into effect on January 1st, 2020. Unlike asking
It is time to update our annual Cyber Security Budgeting advice. I just lead an exercise at a conference where folks had limited budgets and
Checklist for Compliance In response to the increasing threats of cybercriminal activity and as an effort to protect Non-Public Information (NPI) held by entities under
1420 NW Vivion Road, STE 102
Kansas City, MO 64118
3000 Riverchase Galleria, STE 700
Birmingham, AL 35244