Source: securityboulevard.com – Author: Scott Wright The way AI stores data is a huge concern. As security managers, it makes sense that we are hesitant to...
Author:
The MGM attack: What can be learned for your business – Source: securityboulevard.com
Source: securityboulevard.com – Author: Scott Wright More importantly, the hackers claim to have stolen 6 terabytes of data including the driver’s license numbers and social security...
The 10 most common cyber security myths – Source: securityboulevard.com
Source: securityboulevard.com – Author: Scott Wright Although no data is unimportant, there are different security or risk levels to data which will change how you share...
Spoofing attacks: What they are & how to protect your business – Source: securityboulevard.com
Source: securityboulevard.com – Author: Scott Wright Spoofing attacks often happen through email or online messaging services and rely on the victim to provide sensitive information, such...
Online tracking threats to individuals and organizations – Source: securityboulevard.com
Source: securityboulevard.com – Author: Scott Wright There’s also trade secrets for companies as well. You could have a production facility. You don’t want people to know...
Live phishing tests not getting the results you want? Here’s what to do. – Source: securityboulevard.com
Source: securityboulevard.com – Author: Scott Wright Well, now what? Many companies will require employees to retake the training or even worse send out more phishing tests...
Live panel discussion on insider threats and abuse of privilege – Source: securityboulevard.com
Source: securityboulevard.com – Author: Scott Wright And as we move into artificial intelligence, we have to look at different things like hijacked artificial intelligence with inside...