Charlie Maclean-Bristol investigates AI-driven scams and examines the advantages and disadvantages of AI in the online world with the help of Google Gemini
Charlie Maclean-Bristol discusses questions organizations should consider when responding to a cyber-attack, including how the attacker got into the system and their potential motives.
Start building YOUR Cyber Threat, Vulnerability Detection, and Intelligence Capability with this free excerpt from the groundbreaking book Building an Effective Cybersecurity Program, by Tari Schreider
The world can be a scary place for your business … and cyber threats can be even scarier these days. When hostile state actors and increasingly dangerous corporate espionage are worrying you, you need to focus your energy on cyber threat detection, prevention and response!
This free excerpt from the groundbreaking book Building an Effective Cybersecurity Program…
Charlie Maclean-Bristol discusses the evidence behind cyber attacks indirectly causing the death and injury of people, and the importance of exercises to train employees on working efficiently during a cyber attack.
Rachelle Loyear, Tim McCreight, CPP, John Petruzzi, CPP and David Feeney, CPP discussed Enterprise Security Risk Management (ESRM) and digital transformation
Critical Infrastructure at Risk from Operational Technologies and IOT Vulnerabilities
by Ernie Hayden CISSP GICSP(Gold) PSP
In a recent article, Skybox Technology raised concerns resulting in the above headline. Even in a Kaspersky news release, Internet of Things (IoT) cyberattacks have more than doubled during the first half of 2021. Kaspersky also noted that from…