Comprehensive 80 incident response templates, playbooks, and scenarios that help teams build plans faster and strengthen cyber readiness.
Popular file transfer tool MOVEit's recent data security vulnerability prompted many businesses to communicate, internally and externally, about the impact of the incident on its business. Businesses ...
More recently, on May 21, the SEC staff issued further guidance to clarify the distinction between two types of Form 8-K disclosures: Item 1.05, which should be used to disclose material cybersecurity ...
Let’s face it; a computer security incident can occur at any time. Whether it’s the result of a networkwide malware infection, the work of a malicious hacker or a trusted employee with an ax to grind, ...
Joseph Carson, Chief Security Scientist at ThycoticCentrify, offers a 7-step practical IR checklist for ensuring a swift recovery from a cyberattack. In a startling discovery, a recent report found ...
Data breaches have become an unfortunate reality for most companies. If you haven’t already experienced one, just wait. Whether state-sponsored or committed by an individual, hacking and the resulting ...
K12 Security Information Exchange today released a free Cyber Incident Response Runbook for U.S. public schools, a fill-in-the-blank style guide created specifically to help K–12 school leaders build ...
Don’t wait until it’s too late to discover your IR plan has holes. Download our resource to secure your strategy and your schools. Rebecca Torchia is a web editor for EdTech: Focus on K–12. Previously ...
We've been hearing a lot about software supply chain attacks over the past two years, and with good reason. The cybersecurity ecosystem and industry at large have been inundated with warnings about ...
Karen Scarfone is the principal consultant for Scarfone Cybersecurity. She provides cybersecurity publication consulting services to organizations and was formerly a senior computer scientist for the ...
In today’s digital landscape, the importance of an effective security plan cannot be overstated. Such a plan is vital for safeguarding sensitive information and critical assets. Within this ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results