According to Citrix and Resecurity, attackers exploited weak passwords and bypassed multi-factor authentication to obtain Citrix’s business documents.
|
|
KnowBe4, a leader in end-user security training, has acquired El Pescador, a Brazilian security awareness and training company. This could be a good fit if you are looking...
|
|
Successful information security governance requires a venue to address security concerns with participation across the entire business. Without access to requisite details...
|
|
Read this Executive Brief to understand why a security steering committee is different than an IT steering committee but just as valuable.
|
|
This storyboard will help you set up your steering committee and identify the key players, their responsibilities and the capabilities of your committee.
|
|
This phase of the blueprint, Improve Security Governance with a Security Steering Committee, will help you define your committee.
|
|
This phase of the blueprint, Improve Security Governance with a Security Steering Committee, will help you determine how information will flow between the committee and the...
|
|
This phase of the blueprint, Improve Security Governance with a Security Steering Committee, will help you define your meeting agendas and the procedures to support those...
|
|
Use this template to explain the goals and benefits of the Information Security Steering Committee.
|
|
The GDPR enforcement deadline is here. Organizations must understand the risk of non-compliance and what the ramifications may mean for their reputation and future revenue....
|
|