Fortinet has alerted customers to four new indicators of compromise (IoCs) related to a widely exploited zero-day vulnerability in its FortiManager network and security management tool. The critical vulnerability,...
Blog: Best 10 Regulatory Change Management Software of 2024 According to a recent KPMG report, 43% of Chief Ethics and Compliance Officers (CCOs) find new regulatory requirements their greatest...
The NIST Cybersecurity Framework (CSF) has long served as a cybersecurity cornerstone, offering a structured approach to managing and improving cybersecurity risk. With the release of NIST CSF 2.0,...
As the 2024 presidential election draws near, the candidates’ positions on cybersecurity and tech regulation will likely come into sharp focus. Vice President Kamala Harris and former President Donald...
In what Europol has labeled the most significant crackdown against botnets to date, Operation Endgame saw law enforcement agencies from a group of nations launching a sweeping assault on...
In recent weeks, NIST’s National Vulnerability Database (NVD) has been experiencing a slowdown. Since February 15, 2024, a prominent notice has adorned the NVD’s main page, signaling disruptions in...
The proliferation of deepfake creation software on the Dark Web is fueling a surge in AI-assisted financial fraud, raising urgent questions about how to combat this growing threat. Recently,...
The digital era has brought new levels of attention to the privacy debate. From big data breaches in fortune 500 companies to small-scale fraud, it’s clear public perception is...
Please tell us a bit about yourself, your background, and your journey of becoming a CISO at Help at Home My name is Chris Lockery, I am from the...
Tesla has acknowledged in an official filing with the Maine attorney general that the recent data breach, which affected over 75,000 individuals, resulted from an “inside job.” The breach...
Please tell us a bit about yourself, your background, and your journey of becoming a Virtual CISO at DuHart Consulting – what is a Virtual CISO anyway? Being a virtual...