Cybersecurity budgets grew minimally in 2024, and although Forrester found that more than half of surveyed global security technology leaders expect a budget increase in 2025, this growth is minimal, ...
In episode 354, we discuss the emergence of the term ‘Advanced Persistent Teenagers’ (APT) as a “new” cybersecurity threat. Recorded just before the election, the hosts humorously predict election ...
Deployment of 5G and AI-enhanced IoT systems is accelerating. This, in turn, is driving up the number of IoT-connected ...
Your internet account passwords are probably among the most guarded pieces of information you retain in your brain. With ...
The Montana Consumer Data Privacy Act (MTCDPA), which became effective on October 1, 2024, introduces a series of data privacy rights for Montana residents and compliance obligations for businesses ...
The Tennessee Information Protection Act (TIPA), effective July 1, 2025, is a state-level data privacy law that regulates how companies manage and protect consumers’ personal data within Tennessee. ...
Faced with a critical system failure, would you choose a month without MFA or data backups? Explore the consequences of each in this risk management exercise.
ISPs face a few unique challenges and risks when it comes to DDoS attacks. Their size and complexity make them bigger targets for hackers, while their unique structural features require more tailored ...
Your internet account passwords are probably among the most guarded pieces of information you retain in your brain. With everything that has recently migrated to the ...
See how the Grip-ServiceNow integration enhances ITSM by identifying and managing shadow SaaS, reducing costs, boosting efficiency, and strengthening security.
Have you ever wondered how to get the most from generative AI models built into your cybersecurity tools? While there is a ...
CISA is warning about a spear-phishing campaign that spreads malicious RDP files. Plus, OWASP is offering guidance about ...